Vulnerability Categories
Each vulnerability is classified into one primary category based on its root cause. Click a category heading to filter the main database.
Attacks that exploit the inability to distinguish between instructions and data, allowing malicious input to manipulate LLM behavior.
Failures to properly validate, sanitize, or filter inputs that flow through MCP tool interfaces.
Weaknesses in authenticating MCP servers, authorizing tool access, or managing user consent.
Protocol-level and implementation weaknesses in how MCP sessions are created, maintained, and terminated.
Absence of mechanisms to detect or prevent unauthorized modification of tool definitions, descriptions, or behavior.
Fundamental architectural assumptions about trust that create systemic vulnerabilities in the MCP ecosystem.
Insecure handling, storage, or transmission of API keys, tokens, and other credentials used by MCP servers.
Vulnerabilities in network-level protections including DNS rebinding, SSRF, default binding to all interfaces, and transport-layer security failures in MCP deployments.
Severity Rating Scale
Severity is assessed based on exploitability, impact scope, and real-world risk.
Exploitability Levels
How difficult it is for an attacker to exploit the vulnerability in practice.
Cisco AI Security Framework Mapping
Vulnerabilities mapped to attacker objectives from the Cisco AI Security Framework.
Goal Hijacking
17Manipulating AI agent goals to serve attacker objectives instead of user intent
Data Privacy Violation
21Unauthorized access, collection, or exfiltration of sensitive user data
Privilege Escalation
18Gaining unauthorized elevated access to systems, resources, or capabilities
Integrity Compromise
9Unauthorized modification of tool definitions, data, or system behavior
Unauthorized Access
27Accessing resources, systems, or data without proper authorization
Supply Chain Compromise
5Introducing vulnerabilities through compromised tools, packages, or dependencies
Communication Compromise
5Intercepting or manipulating communications between MCP components
Tag Vocabulary
Standardized tags for cross-cutting concerns and attack characteristics.
Affected Components
Which parts of the MCP architecture are impacted.
MCP Client
Vulnerabilities in MCP client implementations (e.g., Claude Desktop, Cursor)
16 vulnsMCP Server
Vulnerabilities in MCP server implementations
38 vulnsMCP Protocol
Vulnerabilities in the MCP protocol specification itself
5 vulnsMCP Ecosystem
Vulnerabilities in the broader MCP tooling ecosystem (inspectors, registries)
6 vulns