Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution

Three Flaws in Anthropic MCP Git Server Enable File Access and Code Execution

Posted on January 20, 2026January 20, 2026 By CWS

Ravie LakshmananJan 20, 2026Vulnerability / Synthetic Intelligence
A set of three safety vulnerabilities has been disclosed in mcp-server-git, the official Git Mannequin Context Protocol (MCP) server maintained by Anthropic, that may very well be exploited to learn or delete arbitrary information and execute code below sure circumstances.
“These flaws could be exploited by immediate injection, that means an attacker who can affect what an AI assistant reads (a malicious README, a poisoned difficulty description, a compromised webpage) can weaponize these vulnerabilities with none direct entry to the sufferer’s system,” Cyata researcher Yarden Porat mentioned in a report shared with The Hacker Information.
Mcp-server-git is a Python bundle and an MCP server that gives a set of built-in instruments to learn, search, and manipulate Git repositories programmatically through giant language fashions (LLMs).

The safety points, which have been addressed in variations 2025.9.25 and 2025.12.18 following accountable disclosure in June 2025, are listed under –

CVE-2025-68143 (CVSS rating: 8.8 [v3] / 6.5 [v4]) – A path traversal vulnerability arising on account of the git_init instrument accepting arbitrary file system paths throughout repository creation with out validation (Mounted in model 2025.9.25)
CVE-2025-68144 (CVSS rating: 8.1 [v3] / 6.4 [v4]) – An argument injection vulnerability arising on account of git_diff and git_checkout features passing user-controlled arguments on to git CLI instructions with out sanitization (Mounted in model 2025.12.18)
CVE-2025-68145 (CVSS rating: 7.1 [v3] / 6.3 [v4]) – A path traversal vulnerability arising on account of a lacking path validation when utilizing the –repository flag to restrict operations to a selected repository path (Mounted in model 2025.12.18)

Profitable exploitation of the above vulnerabilities might permit an attacker to show any listing on the system right into a Git repository, overwrite any file with an empty diff, and entry any repository on the server.

In an assault state of affairs documented by Cyata, the three vulnerabilities may very well be chained with the Filesystem MCP server to put in writing to a “.git/config” file (usually situated throughout the hidden .git listing) and obtain distant code execution by triggering a name to git_init by way of a immediate injection.

Use git_init to create a repo in a writable listing
Use the Filesystem MCP server to put in writing a malicious .git/config with a clear filter
Write a .gitattributes file to use the filter to sure information
Write a shell script with the payload
Write a file that triggers the filter
Name git_add, which executes the clear filter, operating the payload

In response to the findings, the git_init instrument has been faraway from the bundle and provides further validation to stop path traversal primitives. Customers of the Python bundle are advisable to replace to the most recent model for optimum safety.
“That is the canonical Git MCP server, the one builders are anticipated to repeat,” Shahar Tal, CEO and co-founder of Agentic AI safety firm Cyata, mentioned. “If safety boundaries break down even within the reference implementation, it is a sign that the whole MCP ecosystem wants deeper scrutiny. These aren’t edge circumstances or unique configurations, they work out of the field.”

The Hacker News Tags:Access, Anthropic, Code, Enable, Execution, File, Flaws, Git, MCP, Server

Post navigation

Previous Post: Hackers Use LinkedIn Messages to Spread RAT Malware Through DLL Sideloading
Next Post: Chainlit Vulnerabilities May Leak Sensitive Information

Related Posts

China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes China-Linked UAT-7290 Targets Telecoms with Linux Malware and ORB Nodes The Hacker News
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog The Hacker News
The State of AI in the SOC 2025 The State of AI in the SOC 2025 The Hacker News
Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero Google Launches DBSC Open Beta in Chrome and Enhances Patch Transparency via Project Zero The Hacker News
New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack The Hacker News
Cybercrime Trends: Codespaces Exploits and More Cybercrime Trends: Codespaces Exploits and More The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News