Security experts flag another worrying issue with Anthropic AI systems – here’s what they found


- Anthropic’s MCP Inspector project carried a flaw that allowed miscreants to steal sensitive data, drop malware
- To abuse it, hackers need to chain it with a decades-old browser bug
- The flaw was fixed in mid-June 2025, but users should still be on their guard
The Anthropic Model Context Protocol (MCP) Inspector project carried a critical-severity vulnerability which could have allowed threat actors to mount remote code execution (RCE) attacks against host devices, experts have warned.
Best known for its Claude conversational AI model, Anthropic developed MCP, an open source standard that facilitates secure, two-way communication between AI systems and external data sources. It also built Inspector, a separate open source tool that allows developers to test and debug MCP servers.
Now, it was reported that a flaw in Inspector could have been used to steal sensitive data, drop malware, and move laterally across target networks.
Patching the flaw
Apparently, this is the first critical-level vulnerability in Anthropic’s MCP ecosystem, and one that opens up an entire new class of attacks.
The flaw is tracked as CVE-2025-49596, and has a severity score of 9.4/10 – critical.
“This is one of the first critical RCEs in Anthropic’s MCP ecosystem, exposing a new class of browser-based attacks against AI developer tools,” Avi Lumelsky from Oligo Security explained.
“With code execution on a developer’s machine, attackers can steal data, install backdoors, and move laterally across networks – highlighting serious risks for AI teams, open-source projects, and enterprise adopters relying on MCP.”
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
To abuse this flaw, attackers need to chain it with “0.0.0.0. Day”, a two-decade-old vulnerability in web browsers that enable malicious websites to breach local networks, The Hacker News explains, citing Lumelsky.
By creating a malicious website, and then sending a request to localhost services running on an MCP server, attackers could run arbitrary commands on a developer’s machine.
Anthropic was notified about the flaw in April this year, and came back with a patch on June 13, pushing the tool to version 0.14.1. Now, a session token is added to the proxy server, as well as origin validation, rendering the attacks moot.
You might also like
Anthropic’s MCP Inspector project carried a flaw that allowed miscreants to steal sensitive data, drop malware To abuse it, hackers need to chain it with a decades-old browser bug The flaw was fixed in mid-June 2025, but users should still be on their guard The Anthropic Model Context Protocol (MCP)…
Recent Posts
- Another top WordPress plugin hacked to allow account takeover – stay safe with these tips
- PS5 hit Helldivers 2 makes history as the first PlayStation-published game to get an Xbox release
- Paramount Plus slashes prices to $2 for two months
- Apple’s colorful Watch Solo Loop bands are up to 70 percent off now
- How to Pick the Best Roku Device (2025): A Guide to Each Model
Archives
- July 2025
- June 2025
- May 2025
- April 2025
- March 2025
- February 2025
- January 2025
- December 2024
- November 2024
- October 2024
- September 2024
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- June 2023
- May 2023
- April 2023
- March 2023
- February 2023
- January 2023
- December 2022
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- October 2021
- September 2021
- August 2021