As you can see, the recipient has been replaced with the recipient specified in the malicious MCP server description.
It is a clear violation of trust between MCP Servers. The malicious server didn’t even need to be running; it just needed to be connected to Cursor.
Conclusion
The security issues identified within the MCP and LLM ecosystem poses significant risks. Crossing security boundaries between MCP servers can alter the intended execution flow, potentially resulting in unintended or harmful actions. Although most actions still require user approval, there is often an option to enable an auto-run mode. It is easy to imagine users, tired of repeated prompts such as “Do you want to proceed?”, eventually choosing “Do it and don’t ask again.” Unfortunately, it may take only a single mistake or a few lines of malicious instructions to cause a major data breach or compromise an entire organisation.
Downloading and connecting to the MCP Servers is a well-known risk, similar to downloading untrusted software from the Internet, but in this case, the threat applies to a new, rapidly growing technology where the hype can overshadow cautious security practices.
This increases the likelihood of inadvertently connecting to a malicious MCP server, effectively downloading and executing malware disguised as a legitimate tool.
Before deploying MCP servers, organisations must fully understand these risks and their security implications. Before deploying MCP servers, organisations must fully understand these risks and their security implications.
Recommended mitigations and best practices include:
- Tool descriptions should be clear, complete, and easily accessible to users.
- Descriptions must be verified, audited, and continuously monitored.
- Any changes to a tool’s description should trigger user notifications.
- Clients should verify the integrity and authenticity of tools before use.
- Strict boundaries and robust data flow controls between different MCP servers are essential to maintain trust and prevent misuse.
- The MCP server code itself should undergo thorough security reviews. Recent research by Equixly [4] revealed that “43% of tested implementations contained command injection vulnerabilities”.
- Organisations should consider creating trusted repositories or internal “app stores” for MCP servers to reduce the risk of introducing malicious or unvetted components.
The full authorisation flow for MCP servers is still in development; however, the foundational aspects for securing the MCP Client to MCP Server connection are in place, and solutions should build on that [5]. However. the standard for securing the MCP Server to downstream systems or tools is still being established.
At Pentest, we recognise the impact of emerging technologies and the potential security implications they may entail. New technologies often introduce new vulnerabilities and attack surfaces. That is why penetration testing is essential for ensuring the safety of both you and your customers.
References
[1] – https://modelcontextprotocol.io/introduction
[2] – https://invariantlabs.ai/blog
[3] – https://hiddenlayer.com/innovation-hub/exploiting-mcp-tool-parameters/
[4] – https://equixly.com/blog/2025/03/29/mcp-server-new-security-nightmare/
[5] – https://modelcontextprotocol.io/specification/2025-06-18/basic/authorization
For more information about MCP security risks and guidance, refer to: https://vulnerablemcp.info/security.html
Additionally, a project tracking known vulnerabilities in this ecosystem can be found here: https://vulnerablemcp.info/