Security Vulnerabilities in Repository Configuration and MCP
10/10 CriticalThree CVEs discovered: malicious code in documents can exfiltrate private data; Model Context Protocol (MCP) allows repository config to override user approval safeguards enabling remote code execution; repository-controlled settings redirect API traffic to attacker servers to steal API keys.
Sources
Collection History
By October 2025, JFrog Security had disclosed critical vulnerabilities in mcp-remote, an OAuth proxy used by hundreds of thousands of environments. CVE-2025-6514 was rated CVSS 9.6 and allowed remote code execution via OS commands embedded in OAuth discovery fields. CVE-2025-6515 enabled what researchers called Prompt Hijacking.
Cloning and opening a malicious repository would be enough to trigger hidden commands, slip past safeguards, and expose active API keys. Repository-controlled configuration settings could override safeguards that require user approval, letting remote code be executed. If a hacker meddles with those, it's possible to redirect API traffic to an attacker controlled server before security protections kick in.