Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Pwn2Own Day 2: Microsoft Exchange, Win Windows Cursor
May 16, 2026
JDownloader Compromised: Malicious Windows & Linux
May 16, 2026
Malicious JPEG Images Exploit PHP Memory Safety Could Trigger
May 16, 2026
Home/CyberSecurity News/Critical Flowise Vulnerability: RCE via MCP Allows Remote
CyberSecurity News

Critical Flowise Vulnerability: RCE via MCP Allows Remote

OX Security has identified a critical vulnerability within Flowise and multiple AI frameworks, a flaw that could expose millions of users to remote code execution (RCE). The flaw stems from the Model...

David kimber
David kimber
April 20, 2026 2 Min Read
5 0

OX Security has identified a critical vulnerability within Flowise and multiple AI frameworks, a flaw that could expose millions of users to remote code execution (RCE).

The flaw stems from the Model Context Protocol (MCP), a widely used communication standard for AI agents developed by Anthropic.

Unlike a typical software bug, this vulnerability stems from an architectural design decision embedded in Anthropic’s official MCP SDKs across Python, TypeScript, Java, and Rust.

Any developer building on the MCP foundation unknowingly inherits this exposure, meaning the attack surface is not limited to a single platform but ripples across the entire AI supply chain.

Architectural Flaw at the Core of MCP

The flaw enables attackers to execute arbitrary commands on vulnerable systems, granting direct access to sensitive user data, internal databases, API keys, and chat histories.

OX Security successfully executed live commands on six production platforms during their research. Flowise, a popular open-source AI workflow builder, is among the most significantly affected platforms.

Researchers identified a “hardening bypass” attack vector against Flowise, demonstrating that even environments configured with additional protections remain exploitable through MCP adapter interfaces.

MCP Disclosure (Source: OX security)
MCP Disclosure (Source: OX security)

The broader blast radius is alarming: over 150 million downloads, more than 7,000 publicly accessible servers, and an estimated 200,000 vulnerable instances across the ecosystem.

At least ten CVEs have been issued so far, covering critical vulnerabilities in platforms including LiteLLM, LangChain, GPT Researcher, Windsurf, DocsGPT, and IBM’s LangFlow.

Four distinct exploitation families were confirmed:

  • Unauthenticated UI injection in popular AI frameworks.
  • Hardening bypasses in “protected” environments like Flowise.
  • Zero-click prompt injection in AI IDEs such as Windsurf and Cursor.
  • Malicious MCP server distribution: 9 out of 11 MCP registries were successfully poisoned during testing.

Anthropic Declines Protocol-Level Fix

OX Security repeatedly recommended root-level patches to Anthropic that would have protected millions of downstream users.

Anthropic declined, characterizing the behavior as “expected.” The company did not object when notified of the researchers’ intent to publish their findings.

Security teams should take immediate action:

  • Block public internet exposure of AI services connected to sensitive APIs or databases.
  • Treat all external MCP configuration input as untrusted and restrict user input from reaching StdioServerParameters.
  • Install MCP servers only from verified sources such as the official GitHub MCP Registry.
  • Run MCP-enabled services inside sandboxed environments with minimal permissions.
  • Monitor AI agent tool invocations for unexpected outbound activity.
  • Update all affected services to their latest patched versions immediately.

OX Security has shipped platform-level protections for its customers, flagging STDIO MCP configurations that include user input as actionable remediation findings.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Vercel Confirms Data Breach, Hackers Accessed Claim Internal

Next Post

Hackers Use CVE-2024-3721 to Infect TBK DVRs With Nexcorium DDoS

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Android 16 VPN Bypass Exposes User IP Lets Malicious
May 16, 2026
OpenClaw Chain Flaws Expose 245 Vulnerabilities Public
May 15, 2026
Gunra Ransomware RaaS Expands After Conti Locker Operations Shifting
May 15, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us