This flaw enables Arbitrary Command Execution (RCE) on any system running a vulnerable MCP implementation, granting attackers direct access to sensitive user data, internal databases, API keys, and chat histories…
We repeatedly recommended root patches to Anthropic - that would have instantly protected millions of downstream users; however, they declined to modify the protocol’s architecture, citing the behavior as “expected.” We subsequently notified Anthropic of our intent to publish these findings, to which they raised no objection.
Through over 30 responsible disclosures and 10+ High/Critical CVEs, OX Security has worked to patch individual projects. However, the root cause remains unaddressed at the protocol level.
Source [2026-04-15; web-archive]
-–
But in practice it actually lets anyone run any arbitrary OS command, if the command successfully creates an STDIO server it will return the handle, but when given a different command, it returns an error after the command is executed.
This logic opens a wide range of attack surfaces, when combined with user input; as it can allow direct arbitrary command execution with no input sanitization, and no red flags to the developer during implementation.
Our examples show the basic case study using Python, but it reflects the same inherent vulnerability from all other programming languages (TypeScript, Java, Golang, etc…)
…
We found 6 official platforms with actual users vulnerable to arbitrary command execution via MCP configurations…
# Case Studies: Real-World Exploitation
…
- Windsurf is an AI-powered IDE designed for developers. While it runs locally, its MCP configuration file (mcp.json) is writable by the AI agent - making it susceptible to prompt injection attacks that add malicious STDIO MCP entries.Attack chain:
- Victim visits an attacker-controlled website and copies a prompt that appears legitimate;
- The site serves different content to Windsurf’s internal requests - injecting a malicious instruction;
- Windsurf receives the malicious prompt and proposes edits to mcp.json - without showing the user what will change – and modifies the file.;
- With no further user interaction; a new STDIO MCP entry is added and immediately executes its command on the victim’s machine.;
Source [2026-04-15; web-archive]

RCE = Remote Command Execution, not “Arbitrary”
This article looks like AI slop
Actually the C stands for Code not Command
Should be pretty easy to notice when saying it in your head, because Remote Code rhymes but Remote Command does not.
https://en.wikipedia.org/wiki/Arbitrary_code_execution
Its either Arbitrary Code Execution or Remote Code Execution
Whoops. At least the letters match with my mistake, lol
What’s more cringe? The lack of understanding of how MCP works or that the attack article was almost certainly written by the very agent they are trying to discredit.
Not saying Anthopic is flawless or MCP shouldn’t been scrutinised, but you’ll never do it with this type of article.



