The Containment Era is here. →Explore

Executive Summary

In January 2026, three critical vulnerabilities were disclosed in Anthropic's official Model Context Protocol (MCP) Git server, a tool widely used for managing Git repositories programmatically via large language models (LLMs). The flaws—identified as CVE-2025-68143, CVE-2025-68144, and CVE-2025-68145—included two path traversal and one argument injection vulnerabilities. Attackers could exploit these bugs through prompt injection via malicious content (e.g., README files, poisoned issue descriptions) to access or overwrite arbitrary files and achieve remote code execution, without needing direct access to victim systems. Chained exploitation with Filesystem MCP enabled full system compromise until patched in late 2025.

This incident highlights growing risks at the intersection of AI-driven development, supply chain dependencies, and insufficient input validation within reference implementations. As organizations increasingly rely on open-source AI tooling, securing both the application layer and its automation becomes vital in defending against evolving prompt-based and supply chain exploitation.

Why This Matters Now

Prompt injection and supply chain vulnerabilities in reference AI model servers pose immediate threats to the broader ecosystem, especially as these toolchains become widely adopted and trusted by default. Fast-moving AI development is amplifying such risks, making robust input validation and secure-by-design practices urgent to defend against unintentional exposure and remote code execution.

Attack Path Analysis

Related CVEs

MITRE ATT&CK® Techniques

Potential Compliance Exposure

Sector Implications

Sources

Frequently Asked Questions

The vulnerabilities highlight gaps in access control, input sanitization, and code execution defenses mapped to frameworks like NIST 800-53, PCI DSS, and HIPAA security rules.

Cloud Native Security Fabric Mitigations and ControlsCNSF

Robust Zero Trust Segmentation, egress policy enforcement, and inline controls could have contained or blocked attacker actions across privilege escalation, lateral movement, and exfiltration phases in this supply-chain attack. Applying cloud-native prevention and visibility would have significantly limited propagation and sensitive data exposure.

Initial Compromise

Control: Cloud Native Security Fabric (CNSF)

Mitigation: Inline behavioral controls prevent unauthorized resource initialization and logic abuse.

Privilege Escalation

Control: Zero Trust Segmentation

Mitigation: Workload identity segmentation blocks elevated access paths to sensitive file locations.

Lateral Movement

Control: East-West Traffic Security

Mitigation: Lateral movement is limited by controlling inter-workload traffic.

Command & Control

Control: Multicloud Visibility & Control

Mitigation: Anomalous connections and suspicious automation are quickly detected and alerted.

Exfiltration

Control: Egress Security & Policy Enforcement

Mitigation: Outbound data exfiltration attempts are prevented to unauthorized destinations.

Impact (Mitigations)

Exploit payloads and destructive commands are detected and blocked in real time.

Impact at a Glance

Affected Business Functions

  • Software Development
  • Version Control
Operational Disruption

Estimated downtime: 3 days

Financial Impact

Estimated loss: $50,000

Data Exposure

Potential unauthorized access to source code repositories and sensitive configuration files.

Recommended Actions

  • Rapidly patch all MCP Git server instances and apply vendor-provided updates to address discovered vulnerabilities.
  • Implement granular Zero Trust Segmentation policies to confine AI-integrated workloads and restrict file system manipulation across service boundaries.
  • Enforce strict east-west and egress controls, leveraging policy enforcement to prevent unauthorized internal movement and outbound data flows.
  • Deploy real-time Multicloud Visibility and inline IPS tools for anomaly detection and to monitor for exploit attempts tied to known CVEs.
  • Integrate automated behavioral controls and continuous monitoring to identify suspicious automation or prompt injection events across AI-augmented developer environments.

Secure the Paths Between Cloud Workloads

A cloud-native security fabric that enforces Zero Trust across workload communication—reducing attack paths, compliance risk, and operational complexity.

Cta pattren Image