Skip to content
Company

The MCP Security Crisis: 30+ CVEs, a 9.6 CVSS Critical, and What It Means for Your Business

The MCP ecosystem has exploded to 1,864+ servers — but 38% lack authentication and 30+ CVEs have been disclosed. The latest: CVE-2025-6514 scores 9.6 (critical RCE). Learn why governed integrations matter.

JT
JieGou Team
· · 10 min read

The MCP Explosion Is Real — and It’s Accelerating

The Model Context Protocol has gone from niche developer tool to foundational infrastructure in under a year. The ecosystem now counts over 1,864 MCP servers, with new ones launching daily. Gartner projects that 75% of API gateways will support MCP by the end of 2026. Anthropic, Google, and OpenAI have all committed to the protocol. MCP is no longer optional — it’s the standard way AI agents connect to the tools and data your business runs on.

For SMBs, this is exciting. MCP means your AI workflows can reach into CRMs, email platforms, payment processors, project management tools, and databases — all through a single, standardized protocol. One integration layer instead of dozens of custom API connectors.

But there’s a problem. The ecosystem is growing faster than its security posture.

30+ CVEs in 60 Days: The Security Numbers Are Alarming

Between January and early March 2026, security researchers disclosed 30+ CVEs affecting MCP servers and related tooling. That’s one new vulnerability every two days in a protocol that most businesses are just starting to adopt.

The numbers get worse when you look deeper:

  • 38% of 500+ scanned MCP servers lack any form of authentication. No API keys. No OAuth. No token validation. Anyone who knows the server address can connect and issue tool calls.
  • Malicious servers can induce “overthinking loops” — a technique where a compromised or intentionally hostile MCP server sends responses designed to make the connected LLM reason in circles, amplifying token consumption by up to 142x. Security researchers call this a “denial-of-wallet” attack. A workflow that should cost $0.05 to run could cost $7.10 — and the user wouldn’t know until the bill arrives.
  • Tool poisoning attacks allow malicious servers to inject hidden instructions into tool descriptions, hijacking the LLM’s behavior without the user’s knowledge. The AI agent thinks it’s calling a legitimate tool — but the tool’s metadata has been crafted to redirect actions, exfiltrate data, or escalate privileges.
  • Rug-pull attacks exploit the gap between tool approval and tool execution. A server can present one set of capabilities during the approval step, then switch to a completely different (malicious) set of tools once the user has granted access.

These aren’t theoretical risks. They’re documented, reproducible, and actively being exploited in the wild.

Why SMBs Are Especially Vulnerable

Enterprise companies have security teams, vendor review processes, and the budget to run their own MCP infrastructure. Most small and mid-sized businesses don’t.

When a 15-person marketing agency connects their AI workflow platform to an MCP server that accesses their Google Ads account, their CRM, and their client billing data — they’re trusting that server with everything. If that server has no authentication, no audit logging, and no data boundary enforcement, a single compromised integration can expose:

  • Customer PII — names, emails, phone numbers, addresses
  • Financial data — invoices, payment methods, transaction histories
  • Credentials — API keys, OAuth tokens, session cookies stored in connected tools
  • Business intelligence — sales pipelines, pricing strategies, client lists

An unvetted MCP integration isn’t automation. It’s a liability.

And the costs aren’t just financial. Data breaches trigger notification requirements under GDPR, CCPA, and dozens of other privacy frameworks. For a small business, the compliance burden alone can be devastating — before you even count the reputational damage.

What to Look For in a Governed Integration Platform

Not all MCP implementations are created equal. If you’re evaluating AI workflow tools that use MCP integrations, here’s what to check:

Authentication Requirements

Every MCP server connection should require authentication. No exceptions. Look for platforms that enforce API key validation, OAuth 2.0 flows, or mutual TLS — and that reject unauthenticated server connections entirely.

Security Review Process

Who reviews the MCP servers available on the platform? Is there a documented security review process? Are servers scanned for known vulnerabilities before they’re made available to users? A marketplace of unreviewed servers is no better than connecting to random endpoints yourself.

Certification Tiers

The best approach is a tiered certification system that gives you clear signal about the trust level of each integration:

  • Community servers — available but flagged as unreviewed, with appropriate warnings
  • Verified servers — passed automated security scanning and basic code review
  • Certified servers — fully audited, with guaranteed SLAs, data handling policies, and ongoing monitoring

Data Boundary Enforcement

Can administrators control which MCP servers their team can access? Can they restrict servers by data sensitivity level? Can they block specific tool categories (e.g., no file-write tools, no credential-access tools)? Without admin controls, governance is aspirational.

Cost Protection

Token budgets, rate limiting, and circuit breakers aren’t nice-to-haves — they’re essential defenses against denial-of-wallet attacks. Look for per-workflow and per-user token limits, automatic circuit breakers that trip when costs spike, and alerting when usage exceeds normal patterns.

How JieGou Approaches MCP Governance

We’ve built MCP governance into the platform from the ground up — not as an afterthought, but as a core architectural decision.

245 MCP Servers Across 3 Certification Tiers

Every MCP server available in JieGou is categorized into one of three tiers:

TierCountWhat It Means
Community180+Available with warnings. Not security-reviewed. Suitable for non-sensitive experimentation.
Verified50+Passed automated vulnerability scanning, dependency audit, and basic code review. Safe for production use with non-critical data.
Certified15Fully audited by our security team. Guaranteed uptime SLAs. Documented data handling policies. Ongoing monitoring and patch management. Suitable for sensitive data and regulated industries.

When you connect a workflow to an MCP server in JieGou, the certification tier is visible at every step — in the server selector, in the workflow builder, and in the execution logs.

Token Budgets and Rate Limiting

Every workflow run in JieGou has configurable token budgets. If a connected MCP server tries to induce an overthinking loop, the circuit breaker trips when the token budget is exhausted — killing the runaway execution before it drains your account.

Rate limiting applies per-user and per-workflow, preventing a single compromised integration from flooding your account with requests. Circuit breakers track error rates and automatically disconnect servers that start returning anomalous responses.

Admin Controls: Allow-Lists and Deny-Lists

Account administrators can configure:

  • Allow-lists — only permit connections to specific, approved MCP servers
  • Deny-lists — block known-problematic servers or entire categories
  • Tier restrictions — require all production workflows to use Verified or Certified servers only
  • Tool-level controls — block specific tool types (e.g., no filesystem-write tools) regardless of server tier

These controls are enforced at the platform level. Individual users can’t override them, even if they have workflow-editing permissions.

Audit Logging

Every MCP server connection, tool call, and data exchange is logged with full context: who initiated it, which workflow, which server, what data was sent and received, and the token cost. Audit logs are immutable and available to account administrators for compliance reporting.

Governed Integrations Mean Safe Adoption From Day One

The MCP security crisis isn’t a reason to avoid AI integrations. It’s a reason to choose a platform that takes governance seriously.

When your team adopts JieGou, they get access to 245 MCP servers across 12 messaging channels and dozens of business tools — with the confidence that every connection is authenticated, every server is categorized by trust level, and every execution is protected by token budgets and circuit breakers.

That’s what “governed integrations” means in practice: your team moves fast, and the platform handles the security guardrails.

Update: Claude Code Targeted by MCP Vulnerabilities (March 2026)

Since this article was first published, two critical CVEs have been disclosed that specifically target Claude Code — one of the most popular AI coding tools — through MCP:

CVEAttack VectorRisk
CVE-2025-59536Prompt injection via MCP tool descriptionsTool descriptions can override agent behavior, causing the AI to execute unintended actions — even when the user hasn’t approved those actions
CVE-2026-21852Cross-server data exfiltrationOne MCP server reads sensitive data from your environment; another server silently exfiltrates it to an external endpoint

These aren’t theoretical. They affect anyone using Claude Code with third-party MCP servers — which includes a significant portion of the developer community.

The cross-server exfiltration vulnerability (CVE-2026-21852) is particularly concerning for teams that connect multiple MCP servers in a single session. Server A might be a legitimate code analysis tool. Server B might be a seemingly harmless formatting utility. But if Server B can read the data Server A accessed, the attack surface multiplies.

What JieGou does differently: Every MCP server in our marketplace goes through certification review before your team can connect to it. Our 3-tier system (Community → Verified → Certified) ensures that tool descriptions are validated, data boundaries are enforced, and cross-server communication is sandboxed. The deny-of-wallet protections (token budgets, circuit breakers) also prevent the cost amplification that accompanies many MCP exploits.

Update: CVE-2025-6514 — CVSS 9.6, the Most Severe MCP Vulnerability Yet (March 2026)

The MCP security situation has escalated further. CVE-2025-6514 is a remote code execution vulnerability in mcp-remote — the most popular MCP transport library — with a CVSS score of 9.6 (Critical).

DetailValue
CVE IDCVE-2025-6514
CVSS Score9.6 (Critical)
Attack VectorRemote, no authentication required
ImpactFull remote code execution
Affected Packagemcp-remote (most popular MCP transport library)
Monthly Downloads97M+ (via npm ecosystem)

This isn’t a niche library. mcp-remote is the standard transport layer that most MCP implementations depend on. A 9.6 CVSS score means: attackable remotely, no authentication needed, full system compromise possible.

Anthropic’s Own Servers Have Vulnerabilities Too

Adding to the concern: Anthropic’s official mcp-server-git — a reference implementation from the protocol’s creator — has three chained vulnerabilities that together enable repository data exfiltration. When the organization that designed MCP can’t secure its own servers, the argument for external governance becomes irrefutable.

The Cumulative Picture Is Getting Worse

MetricJanuary 2026March 2026
Total CVEs disclosed20+30+
Highest CVSS score8.59.6
Servers lacking auth38%38%
Monthly downloads (affected packages)70M+97M+

Every month, the number of vulnerabilities grows, the severity increases, and the blast radius expands. The 38% authentication gap hasn’t improved because the ecosystem prioritizes speed of adoption over security fundamentals.

What This Means for Your Team

If your AI workflows connect to MCP servers — and increasingly, that’s the only way to connect AI to business tools — you need a governance layer between your team and the raw MCP ecosystem. Not every server is dangerous, but without certification and review, you can’t tell which ones are.

JieGou’s 245 certified integrations have been reviewed for exactly these vulnerability patterns. Our 3-tier certification (Community → Verified → Certified) means your team never connects to an unreviewed server in production. Token budgets catch denial-of-wallet attacks. Sandboxing prevents cross-server data exfiltration. Admin controls let you restrict which servers your team can access.

That’s not a feature — it’s a requirement.

Start With Governed Integrations

Connect your tools to AI workflows — without connecting your data to unvetted servers.

Start Free →

mcp security governance integrations adoption
Share this article

Enjoyed this post?

Get workflow tips, product updates, and automation guides in your inbox.

No spam. Unsubscribe anytime.