A set of three critical security vulnerabilities has been disclosed in mcp-server-git, the official Git Model Context Protocol (MCP) server maintained by Anthropic. These flaws can be exploited to read or delete arbitrary files and execute code under certain conditions.
Flaws Identified
The identified flaws enable attackers to exploit prompt injection techniques, allowing them to influence what an AI assistant reads. This could lead to unauthorized access and manipulation of sensitive data.
CVE IDs
Impact and Mitigation
The vulnerabilities pose a significant threat to organizations using Anthropic’s mcp-server-git for managing Git repositories. Immediate action is required to patch these flaws to prevent potential data breaches and unauthorized code execution.
Threat Type and Criticality
Threat Type: Vulnerability
Criticality: 7/10
The severity of this threat lies in its potential for data theft, manipulation, and remote code execution. Prompt action is crucial to mitigate these risks.
Recommendations
- Update mcp-server-git to the latest version containing the patches.
- Review and update access controls on Git repositories.
- Conduct a thorough security audit of all systems using Anthropic’s MCP server.
Conclusion
The discovery of these critical vulnerabilities underscores the importance of regular security assessments and updates for any software system, especially those used in mission-critical applications. Organizations should take immediate steps to patch these flaws and enhance their overall cybersecurity posture.




