Security issues with the mcp-server-git managed by Anthropic are coming into focus. The three critical vulnerabilities (CVE-2025-68143, CVE-2025-68144, CVE-2025-68145) identified by Cyata’s research team on January 21 stem from improper validation of path parameters, which could be exploited to allow direct access to the system.
Risks of Remote Code Execution via Path Traversal and Path Parameter Manipulation
The core of these vulnerabilities lies in insufficient validation of path parameters. Attackers can exploit directory traversal techniques to access files that are normally inaccessible. More maliciously, by inserting malicious values into path parameters, there is even the potential for remote code execution (RCE).
Attackers who bypass file access restrictions can execute arbitrary commands, putting the entire system at risk. According to The Hacker News, such layered vulnerabilities could potentially compromise the entire security architecture.
A more concerning aspect is the possibility that these path parameter vulnerabilities could be combined with prompt injection techniques. Simply inputting prompts containing malicious commands into the AI assistant could automatically exploit the mcp-server-git vulnerabilities.
Unnoticed by users, the AI could execute attacker commands, manipulate system path parameters to steal files, or inject malware. The automation potential of this attack method further elevates the threat level.
Strengthening Path Parameter Validation and Immediate Update Response
Anthropic has patched these three vulnerabilities in the September and December 2025 releases. Specifically, they removed the git_init tool and significantly enhanced the validation logic for path parameters.
Users are strongly encouraged to update to the latest version as soon as possible. Proper validation of path parameters is a fundamental security measure in cloud environments and AI systems, and ongoing monitoring to prevent recurrence of such vulnerabilities is essential.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Three path parameter vulnerabilities discovered on Anthropic's MCP Git server enable remote code execution
Security issues with the mcp-server-git managed by Anthropic are coming into focus. The three critical vulnerabilities (CVE-2025-68143, CVE-2025-68144, CVE-2025-68145) identified by Cyata’s research team on January 21 stem from improper validation of path parameters, which could be exploited to allow direct access to the system.
Risks of Remote Code Execution via Path Traversal and Path Parameter Manipulation
The core of these vulnerabilities lies in insufficient validation of path parameters. Attackers can exploit directory traversal techniques to access files that are normally inaccessible. More maliciously, by inserting malicious values into path parameters, there is even the potential for remote code execution (RCE).
Attackers who bypass file access restrictions can execute arbitrary commands, putting the entire system at risk. According to The Hacker News, such layered vulnerabilities could potentially compromise the entire security architecture.
Prompt Injection Attacks Weaponizing Path Parameter Vulnerabilities
A more concerning aspect is the possibility that these path parameter vulnerabilities could be combined with prompt injection techniques. Simply inputting prompts containing malicious commands into the AI assistant could automatically exploit the mcp-server-git vulnerabilities.
Unnoticed by users, the AI could execute attacker commands, manipulate system path parameters to steal files, or inject malware. The automation potential of this attack method further elevates the threat level.
Strengthening Path Parameter Validation and Immediate Update Response
Anthropic has patched these three vulnerabilities in the September and December 2025 releases. Specifically, they removed the git_init tool and significantly enhanced the validation logic for path parameters.
Users are strongly encouraged to update to the latest version as soon as possible. Proper validation of path parameters is a fundamental security measure in cloud environments and AI systems, and ongoing monitoring to prevent recurrence of such vulnerabilities is essential.