Researchers tracking the Model Context Protocol ecosystem have cataloged over 50 known vulnerabilities, with 13 rated critical, and public repository scans have surfaced large volumes of leaked secrets inside MCP server configurations. These are not theoretical risks. They are active attack surfaces running inside enterprise AI stacks right now.
Security teams managing AI agent deployments face a question they cannot currently answer: how many MCP servers are running in your environment right now, and how many have been reviewed for security?
The Vulnerable MCP Project, a community-driven effort to catalog known MCP security issues, has tracked over 50 discrete vulnerabilities across publicly available MCP server implementations. Thirteen of those vulnerabilities carry critical severity ratings. The project continues to grow because MCP server adoption is growing faster than any centralized security review process can match. Developers publish new servers daily. Enterprises adopt them the same week. Security teams find out months later, if at all.
The scale of secret leakage compounds the problem. Public repository scans have surfaced significant volumes of exposed credentials, API keys, and authentication tokens embedded directly in MCP server configurations committed to GitHub. These are not edge cases. They are a pattern that reflects how quickly MCP servers were built and deployed without security review as a standard step.
This is now a procurement and supply chain issue, not just a developer hygiene issue. When an enterprise deploys an AI agent that connects to a community-maintained MCP server, that server becomes part of the enterprise's effective attack surface. The 2025 Salesloft-Drift compromise demonstrated exactly this dynamic: a third-party integration carrying stolen bearer tokens affected over 700 Salesforce environments. MCP connections follow the same trust model. The agent trusts the server. The server can lie.
A new class of systemic vulnerability disclosed in 2026 made the scope clearer. Design flaws in STDIO-based MCP implementations, present in reference implementations and widely adopted tools, enabled remote command execution across the ecosystem. Multiple CVEs were filed against major AI frameworks as a result. Several scenarios required zero clicks to trigger. The blast radius of a single vulnerable MCP server, connected to agents running with broad SaaS permissions, is not a small number. CVE-2025-6514 in mcp-remote, with a CVSS score of 9.6 and over 437,000 package downloads at the time of disclosure, is one of the highest-profile examples.
Security teams accustomed to CVE-driven patch cycles will find MCP vulnerabilities structurally different. Four factors make remediation harder than it looks.
No central registry. There is no authoritative catalog of MCP servers equivalent to the National Vulnerability Database for traditional software. The Vulnerable MCP Project is community-maintained. Disclosure is voluntary. An enterprise using 40 MCP servers has no single source to query for known vulnerabilities across all of them.
Community-maintained servers with inconsistent review. The majority of MCP servers in active enterprise use were built by individual developers or small teams and published without a security review process. There is no mandatory security audit before a server appears in a marketplace or package registry. The server that looked safe last quarter may have accepted a pull request last week that introduced a command injection flaw.
Agent-side responsibility ambiguity. When a vulnerability exists in an MCP server, the question of who is responsible for remediation is genuinely unclear. The server developer may have abandoned the project. The enterprise that deployed it may not know which teams own which agent connections. The AI platform vendor who built the agent framework takes the position that server security is the customer's responsibility. This ambiguity is not a policy failure. It is a structural feature of the decentralized MCP ecosystem.
Patching requires updating every agent connection. When a vulnerable MCP server is patched, every agent that connects to it must be updated to use the patched version. In environments where MCP sprawl has agent connections growing quarter over quarter, the operational lift of coordinating that update across hundreds of agent configurations is significant. Many organizations discover they do not have a complete list of which agents connect to which servers. You cannot update connections you do not know exist.
This is where shadow AI detection becomes operationally relevant. Shadow MCP servers, servers connected to agents without IT or security awareness, cannot be patched because they are not known. The visibility gap precedes the remediation gap.
The MCP vulnerability landscape in 2026 is not a future risk. It is a current inventory problem. Security teams that know which MCP servers their agents connect to, which of those connections are authenticated, and what those servers are actually instructing agents to do at runtime are in a fundamentally different position than teams ghost chasing theoretical configuration risks.
The six vulnerability classes described here, tool poisoning, prompt injection, command injection, path traversal, hardcoded credentials, and unauthenticated connections, do not require novel attack techniques to exploit. They require only that an attacker find a community-maintained server with no security review and wait for an enterprise agent to connect to it.
The defensive path is sequential. Build the inventory. Classify the connections. Monitor the tool calls at runtime. Enforce least privilege before the next server is added. Probabilistic agents operating across a decentralized MCP ecosystem require deterministic guardrails. Configuration review is not a substitute for runtime truth. Runtime guardrail enforcement is generally available on Microsoft Copilot today, with expanded platform coverage on the roadmap.
To see how Obsidian maps MCP server connections, classifies sanctioned versus unsanctioned servers, and surfaces agent-to-server tool call activity across your environment, explore the AI agent security platform.
Hardcoded credentials in MCP server configurations are the most prevalent class by volume. Large volumes of exposed secrets have been found in public MCP server repositories. Unauthenticated server connections are a close second in terms of enterprise prevalence, particularly in n8n workflows and developer tool environments like Cursor.
Tool poisoning occurs when a malicious or compromised server returns a tool description that redirects agent behavior. The attack arrives through the tool registration mechanism. Prompt injection via MCP occurs when an attacker embeds instructions inside server responses or tool metadata that the underlying language model processes as directives. Both exploit the agent's trust in the server, but they operate at different layers of the MCP interaction model.
Traditional scanners can detect some classes, particularly hardcoded credentials and known CVEs in server dependencies. They cannot detect tool poisoning or prompt injection because those vulnerabilities are expressed in the content of tool descriptions and server responses, not in code patterns or binary signatures. Runtime monitoring of tool calls is required to surface those classes.
Responsibility is genuinely ambiguous. The server developer may have abandoned the project. The enterprise that deployed it owns the risk but may not have the ability to patch the server directly. The AI platform vendor takes the position that server security is outside their scope. In practice, the enterprise security team is responsible for identifying vulnerable servers, removing or replacing them, and ensuring agent connections are updated. This is why inventory and classification are prerequisites, not optional steps.
Build the inventory first. Before expanding MCP usage across business units or agent platforms, establish a sanctioned server list, define an evaluation checklist for new server adoption, confirm that all connections require authentication, and implement runtime monitoring for agent-to-server tool calls. Deploying at scale without these controls in place means the blast radius of the first exploited server will be proportional to the scale of the deployment.