Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Futures Kickoff
Get prepared for your futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to experience risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Three path parameter vulnerabilities discovered on Anthropic's MCP Git server enable remote code execution
Security issues with the mcp-server-git managed by Anthropic are coming into focus. The three critical vulnerabilities (CVE-2025-68143, CVE-2025-68144, CVE-2025-68145) identified by Cyata’s research team on January 21 stem from improper validation of path parameters, which could be exploited to allow direct access to the system.
Risks of Remote Code Execution via Path Traversal and Path Parameter Manipulation
The core of these vulnerabilities lies in insufficient validation of path parameters. Attackers can exploit directory traversal techniques to access files that are normally inaccessible. More maliciously, by inserting malicious values into path parameters, there is even the potential for remote code execution (RCE).
Attackers who bypass file access restrictions can execute arbitrary commands, putting the entire system at risk. According to The Hacker News, such layered vulnerabilities could potentially compromise the entire security architecture.
Prompt Injection Attacks Weaponizing Path Parameter Vulnerabilities
A more concerning aspect is the possibility that these path parameter vulnerabilities could be combined with prompt injection techniques. Simply inputting prompts containing malicious commands into the AI assistant could automatically exploit the mcp-server-git vulnerabilities.
Unnoticed by users, the AI could execute attacker commands, manipulate system path parameters to steal files, or inject malware. The automation potential of this attack method further elevates the threat level.
Strengthening Path Parameter Validation and Immediate Update Response
Anthropic has patched these three vulnerabilities in the September and December 2025 releases. Specifically, they removed the git_init tool and significantly enhanced the validation logic for path parameters.
Users are strongly encouraged to update to the latest version as soon as possible. Proper validation of path parameters is a fundamental security measure in cloud environments and AI systems, and ongoing monitoring to prevent recurrence of such vulnerabilities is essential.