• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution

You are here: Home / General Cyber Security News / Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
January 20, 2026

A set of three security vulnerabilities has been disclosed in mcp-server-git, the official Git Model Context Protocol (MCP) server maintained by Anthropic, that could be exploited to read or delete arbitrary files and execute code under certain conditions.

“These flaws can be exploited through prompt injection, meaning an attacker who can influence what an AI assistant reads (a malicious README, a poisoned issue description, a compromised webpage) can weaponize these vulnerabilities without any direct access to the victim’s system,” Cyata researcher Yarden Porat said in a report shared with The Hacker News.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Mcp-server-git is a Python package and an MCP server that provides a set of built-in tools to read, search, and manipulate Git repositories programmatically via large language models (LLMs).

Cybersecurity

The security issues, which have been addressed in versions 2025.9.25 and 2025.12.18 following responsible disclosure in June 2025, are listed below –

  • CVE-2025-68143 (CVSS score: 8.8 [v3] / 6.5 [v4]) – A path traversal vulnerability arising as a result of the git_init tool accepting arbitrary file system paths during repository creation without validation (Fixed in version 2025.9.25)
  • CVE-2025-68144 (CVSS score: 8.1 [v3] / 6.4 [v4]) – An argument injection vulnerability arising as a result of git_diff and git_checkout functions passing user-controlled arguments directly to git CLI commands without sanitization (Fixed in version 2025.12.18)
  • CVE-2025-68145 (CVSS score: 7.1 [v3] / 6.3 [v4]) – A path traversal vulnerability arising as a result of a missing path validation when using the –repository flag to limit operations to a specific repository path (Fixed in version 2025.12.18)

Successful exploitation of the above vulnerabilities could allow an attacker to turn any directory on the system into a Git repository, overwrite any file with an empty diff, and access any repository on the server.

In an attack scenario documented by Cyata, the three vulnerabilities could be chained with the Filesystem MCP server to write to a “.git/config” file (typically located within the hidden .git directory) and achieve remote code execution by triggering a call to git_init by means of a prompt injection.

  • Use git_init to create a repo in a writable directory
  • Use the Filesystem MCP server to write a malicious .git/config with a clean filter
  • Write a .gitattributes file to apply the filter to certain files
  • Write a shell script with the payload
  • Write a file that triggers the filter
  • Call git_add, which executes the clean filter, running the payload

Cybersecurity

In response to the findings, the git_init tool has been removed from the package and adds extra validation to prevent path traversal primitives. Users of the Python package are recommended to update to the latest version for optimal protection.

“This is the canonical Git MCP server, the one developers are expected to copy,” Shahar Tal, CEO and co-founder of Agentic AI security company Cyata, said. “If security boundaries break down even in the reference implementation, it’s a signal that the entire MCP ecosystem needs deeper scrutiny. These are not edge cases or exotic configurations, they work out of the box.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «hackers use linkedin messages to spread rat malware through dll Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution
  • Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
  • The Hidden Risk of Orphan Accounts
  • Evelyn Stealer Malware Abuses VS Code Extensions to Steal Developer Credentials and Crypto
  • Cloudflare Fixes ACME Validation Bug Allowing WAF Bypass to Origin Servers
  • Why Secrets in JavaScript Bundles are Still Being Missed
  • Tudou Guarantee Marketplace Halts Telegram Transactions After Processing Over $12 Billion
  • Google Gemini Prompt Injection Flaw Exposed Private Calendar Data via Malicious Invites
  • ⚡ Weekly Recap: Fortinet Exploits, RedLine Clipjack, NTLM Crack, Copilot Attack & More
  • DevOps & SaaS Downtime: The High (and Hidden) Costs for Cloud-First Businesses

Copyright © TheCyberSecurity.News, All Rights Reserved.