Vulnerability Taxonomy

Structured classification framework for MCP security vulnerabilities, mapped to the Cisco AI Security Framework

Vulnerability Categories

Each vulnerability is classified into one primary category based on its root cause. Click a category heading to filter the main database.

Protocol-level and implementation weaknesses in how MCP sessions are created, maintained, and terminated.

Insecure handling, storage, or transmission of API keys, tokens, and other credentials used by MCP servers.

Severity Rating Scale

Severity is assessed based on exploitability, impact scope, and real-world risk.

Exploitability Levels

How difficult it is for an attacker to exploit the vulnerability in practice.

Trivial No special skills or tools needed; publicly documented steps 4
Easy Basic technical knowledge required; proof-of-concept exists 18
Moderate Requires understanding of MCP internals or specific conditions 27
Difficult Requires advanced skills, chaining multiple vulnerabilities, or rare conditions 0
Theoretical No known public exploit; risk is based on design analysis 1

Cisco AI Security Framework Mapping

Vulnerabilities mapped to attacker objectives from the Cisco AI Security Framework.

Tag Vocabulary

Standardized tags for cross-cutting concerns and attack characteristics.

Affected Components

Which parts of the MCP architecture are impacted.

MCP Client

Vulnerabilities in MCP client implementations (e.g., Claude Desktop, Cursor)

16 vulns

MCP Server

Vulnerabilities in MCP server implementations

38 vulns

MCP Protocol

Vulnerabilities in the MCP protocol specification itself

5 vulns

MCP Ecosystem

Vulnerabilities in the broader MCP tooling ecosystem (inspectors, registries)

6 vulns