INCIDENTFEB 2026
Mexican Government · jailbroken-chatbot breachNine agencies · 150 GB exfiltrated
A single operator jailbroke Claude and ChatGPT over a four-week campaign from December 2025 through January 2026. The AI was instructed to act as a bug-bounty researcher. 195 million taxpayer records, voter rolls, civil registry files, and government employee credentials were stolen across federal (SAT, INE), state (Jalisco, Michoacán, Tamaulipas), and municipal (Mexico City civil registry, Monterrey water utility) systems. No custom malware. No zero-day. Disclosed by Gambit Security. Four of the alleged victims disputed the account; Anthropic confirmed the activity and banned the accounts.
195M RECORDS9 AGENCIES
Bloomberg · Gambit · Anthropic
CVEAPR 2026
MCPwn · nginx-ui auth bypassCVE-2026-33032 · CVSS 9.8
A single missing middleware call exposed 12 MCP tools to any network attacker. Full nginx takeover through one unauthenticated request. Actively exploited in the wild, added to VulnCheck KEV. Over 2,600 reachable instances identified via Shodan. The fix was 27 characters. Recorded Future ranked it among the 31 most dangerous vulnerabilities exploited in March 2026.
CVSS 9.8 · KEV2,600+ INSTANCES
Pluto Security · Recorded Future
CVEAPR 2026
Azure MCP Server auth bypassCVE-2026-32211 · CVSS 9.1
Microsoft disclosed a critical authentication flaw in the official @azure-devops/mcp package. The server exposed DevOps tooling (work items, repos, pipelines, pull requests) with no authentication layer at all. Unauthorized access to configuration details, API keys, tokens, project data.
CVSS 9.1AZURE DEVOPS
Microsoft · CVEdetails
INCIDENTAPR 2026
Systemic MCP SDK flawOx Security · Anthropic MCP SDKs
Architectural flaw in Anthropic's official MCP SDKs (Python, TypeScript, Java, Rust). The STDIO interface runs a passed command regardless of whether the server process starts. Arbitrary command execution. No sanitization, no warning, 150M downloads affected. Anthropic confirmed the behavior is by design and declined to modify the protocol.
200,000+ INSTANCES150M DOWNLOADS
Infosecurity Mag · Ox Security
INCIDENTMAR 2026
McKinsey "Lilli" agent exposureEnterprise knowledge system
A researcher gained access to Lilli in under two hours. 46.5 million plaintext chat messages covering strategy, M&A, and client engagements. Plus 728,000 confidential files, 57,000 user accounts, and 95 writable system prompts controlling Lilli firm-wide.
46.5M MESSAGES95 SYSTEM PROMPTS
Wharton AI Initiative
INCIDENTMAR 2026
Meta internal breachAI agent · Sev-1
An engineer trusted an AI agent inside Meta's developer forum. The agent altered access settings and surfaced restricted records to unauthorized colleagues. Meta rated it Sev-1 with a two-hour exposure window.
SEV-1 INCIDENT2HR EXPOSURE
The Information · The Guardian
CVEFEB 2026
MCPJam Inspector RCECVE-2026-23744 · CVSS 9.8
MCPJam Inspector listens on 0.0.0.0 by default with no authentication. A crafted HTTP request installs an MCP server and executes arbitrary code on the host. No user interaction required. Exploitability: trivial.
CVSS 9.8 · CRITRCE · 0-CLICK
GitLab Advisory
INCIDENTFEB 2026
1,184 malicious agent skillsClawHub · OpenClaw marketplace
Antiy CERT confirmed 1,184 malicious skills across ClawHub, the marketplace for the OpenClaw framework (135K+ GitHub stars). 21,000+ exposed instances in the wild, connecting to Slack and Google Workspace with elevated privileges.
1,184 SKILLS21K INSTANCES
Antiy CERT · Reco
CVEFEB 2026
MCP TypeScript SDK cross-client leakCVE-2026-25536 · CVSS 7.1
A single McpServer reused across clients with StreamableHTTPServerTransport can leak responses across client boundaries. One client receives data intended for another. Affects v1.10.0–1.25.3.
CVSS 7.1 · HIGHDATA LEAK
MCP CVE Feed
INCIDENTFEB 2026
492 MCP servers exposed publiclyTrend Micro disclosure
492 MCP servers discovered exposed to the internet with zero authentication. Separately, 7,000+ MCP servers analyzed by BlueRock Security. 36.7% vulnerable to SSRF, AWS credential theft demonstrated via MarkItDown.
492 EXPOSED36.7% SSRF
Trend Micro · BlueRock
CVEJAN 2026
Anthropic Git MCP RCE chainCVE-2025-68145 / 68143 / 68144
Three chained vulnerabilities in Anthropic's own mcp-server-git. Path validation bypass + unrestricted git_init + argument injection in git_diff. Combined with the Filesystem MCP server: full RCE via malicious .git/config.
CHAINED RCEANTHROPIC OFFICIAL
The Register · Cyata
INCIDENT2025
Postmark MCP supply-chain attackMalicious package in MCP ecosystem
A malicious MCP server masquerading as the legitimate Postmark MCP silently BCC-copied all email traffic. Internal memos, invoices, confidential docs, all forwarded to an attacker-controlled server.
ALL EMAILSUPPLY CHAIN
IT Pro
INCIDENT2025
GitHub MCP prompt injectionInvariant Labs disclosure
A malicious public GitHub issue hijacked an AI assistant using the official GitHub MCP server. The compromised agent exfiltrated private repo contents, internal project details, and personal financial data into a public pull request.
PRIVATE REPOSPAT ABUSE
Invariant Labs
INCIDENT2025
EchoLeak zero-click AI attackCVE-2025-32711 · CVSS 9.3
Microsoft Copilot silently exfiltrated sensitive organizational data across OneDrive, SharePoint, and Teams through automated prompt manipulation. Zero clicks. Zero alerts. First zero-click vulnerability disclosed against an enterprise AI agent.
CVSS 9.3 · 0-CLICKM365 AT SCALE
Microsoft MSRC · Reco
PRECURSORAUG 2025
Salesloft-Drift OAuth abuseUNC6395 · 700+ orgs · the template
Human-run, but the exact operational pattern autonomous agents will inherit. Stolen OAuth tokens from Drift's Salesforce integration accessed customer environments across 700+ organizations. No phishing, no exploit. The traffic looked legitimate because it came from a trusted SaaS-to-SaaS link. Replace "stolen token" with "over-scoped agent grant" and you have the shape of every MCP incident above.
700+ ORGSOAUTH CHAIN
Reco · Mandiant