Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New Password-Stealing Phishing Campaign Targets Dropbox Credentials

February 6, 2026

Researchers Find 175,000 Publicly Exposed Ollama AI Servers Across 130 Countries

February 6, 2026

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Prompt Injection Bugs Found in Official Anthropic Git MCP Server
Cyber Security

Prompt Injection Bugs Found in Official Anthropic Git MCP Server

Team-CWDBy Team-CWDJanuary 20, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Three security vulnerabilities in the official Git server for Anthropic’s Model Context Protocol (MCP), mcp-server-git, have been identified by cybersecurity researchers.

The flaws can be exploited through prompt injection, allowing attackers to manipulate AI assistants into performing unintended actions without needing direct access to a target system.

The issues affect all versions of mcp-server-git released before December 8, 2025, and apply to default installations.

According to cybersecurity firm Cyata, who discovered the flaws, an attacker only needs to influence what an AI assistant reads, such as a malicious README file, a poisoned issue description or a compromised webpage, to trigger the vulnerabilities. No credentials or system access are required.

The flaws allow attackers to execute code when mcp-server-git is used alongside a filesystem MCP server, delete arbitrary files and load arbitrary files into a large language model’s context. While the vulnerabilities do not directly exfiltrate data, sensitive files may still be exposed to the AI, creating downstream security and privacy risks.

The findings are notable because they affect Anthropic’s reference MCP implementation.

Previous MCP-related issues typically relied on unusual configurations or unsafe deployments. In this case, Cyata found that the vulnerabilities worked “out of the box,” increasing the likelihood of real-world impact.

Read more on Anthropic vulnerabilities: Claude Desktop Extensions Vulnerable to Web-Based Prompt Injection

Why the MCP Design Raises Risk

MCP is an open standard introduced by Anthropic in November 2024 to allow AI assistants to interact with tools such as filesystems, APIs, databases and developer utilities like Git. MCP servers act as a bridge, executing real system actions based on decisions made by large language models.

Cyata’s research showed that mcp-server-git does not properly validate repository paths or sanitise arguments passed to Git commands.

As a result, an attacker can direct the server to operate on any directory on the system, not just the repository defined in its configuration. In one case, unsanitized arguments to the git_diff command allow attackers to overwrite files. In others, misuse of git_init enables file deletion or prepares the ground for code execution when combined with file-writing capabilities.

The vulnerabilities have been assigned CVE-2025-68143, CVE-2025-68144 and CVE-2025-68145. Anthropic accepted the reports in September and released fixes in December 2025.

Cyata advised affected users to update immediately and review how MCP servers are combined in their environments, particularly when Git and filesystem access are both enabled.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleChainlit Security Flaws Highlight Infrastructure Risks in AI Apps
Next Article Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

How it preys on personal data – and how to stay safe

October 23, 2025

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

How cybercriminals are targeting content creators

November 26, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.