HomeVulnerabilityThree Flaws in Anthropic MCP Git Server Allow File Entry and Code...

Three Flaws in Anthropic MCP Git Server Allow File Entry and Code Execution

A set of three security vulnerabilities has been disclosed in mcp-server-git, the official Git Mannequin Context Protocol (MCP) server maintained by Anthropic, that could possibly be exploited to learn or delete arbitrary recordsdata and execute code below sure circumstances.

“These flaws could be exploited via immediate injection, that means an attacker who can affect what an AI assistant reads (a malicious README, a poisoned concern description, a compromised webpage) can weaponize these vulnerabilities with none direct entry to the sufferer’s system,” Cyata researcher Yarden Porat stated in a report shared with The Hacker Information.

Mcp-server-git is a Python bundle and an MCP server that gives a set of built-in instruments to learn, search, and manipulate Git repositories programmatically by way of giant language fashions (LLMs).

Cybersecurity

The security points, which have been addressed in variations 2025.9.25 and 2025.12.18 following accountable disclosure in June 2025, are listed under –

  • CVE-2025-68143 (CVSS rating: 8.8 [v3] / 6.5 [v4]) – A path traversal vulnerability arising because of the git_init software accepting arbitrary file system paths throughout repository creation with out validation (Mounted in model 2025.9.25)
  • CVE-2025-68144 (CVSS rating: 8.1 [v3] / 6.4 [v4]) – An argument injection vulnerability arising because of git_diff and git_checkout features passing user-controlled arguments on to git CLI instructions with out sanitization (Mounted in model 2025.12.18)
  • CVE-2025-68145 (CVSS rating: 7.1 [v3] / 6.3 [v4]) – A path traversal vulnerability arising because of a lacking path validation when utilizing the –repository flag to restrict operations to a selected repository path (Mounted in model 2025.12.18)
See also  Fortinet Warns of Crucial FortiWLM Flaw That May Result in Admin Entry Exploits

Profitable exploitation of the above vulnerabilities may enable an attacker to show any listing on the system right into a Git repository, overwrite any file with an empty diff, and entry any repository on the server.

In an assault situation documented by Cyata, the three vulnerabilities could possibly be chained with the Filesystem MCP server to write down to a “.git/config” file (sometimes positioned throughout the hidden .git listing) and obtain distant code execution by triggering a name to git_init by the use of a immediate injection.

  • Use git_init to create a repo in a writable listing
  • Use the Filesystem MCP server to write down a malicious .git/config with a clear filter
  • Write a .gitattributes file to use the filter to sure recordsdata
  • Write a shell script with the payload
  • Write a file that triggers the filter
  • Name git_add, which executes the clear filter, working the payload
Cybersecurity

In response to the findings, the git_init software has been faraway from the bundle and provides further validation to forestall path traversal primitives. Customers of the Python bundle are beneficial to replace to the newest model for optimum safety.

See also  Mitigations and Defending Towards Future Threats

“That is the canonical Git MCP server, the one builders are anticipated to repeat,” Shahar Tal, CEO and co-founder of Agentic AI security firm Cyata, stated. “If security boundaries break down even within the reference implementation, it is a sign that the whole MCP ecosystem wants deeper scrutiny. These are usually not edge circumstances or unique configurations, they work out of the field.”

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular