Critical Vulnerability in MCP Server Platform Exposes Thousands of API Keys

A configuration flaw in the Smithery.ai registry for Model Context Protocol (MCP) servers allowed attackers to execute path-traversal attacks via unsafe dockerBuildPath settings. This exposed over 3,000 AI servers and thousands of user API keys, enabling full system access and data exfiltration. The issue was fixed in June 2025 after disclosure, but the incident demonstrates how AI-toolchain supply-chain weaknesses can cascade rapidly. 

https://cybersecuritynews.com/mcp-server-platform-vulnerability/

Comments

Popular posts from this blog

Prompt Engineering Demands Rigorous Evaluation

Secure Vibe Coding Guide: Best Practices for Writing Secure Code

KEVIntel: Real-Time Intelligence on Exploited Vulnerabilities