Navigation
Search
|
MCP attack abuses predictable session IDs to hijack AI agents
Tuesday October 21, 2025. 09:36 PM , from TheRegister
The vuln affects the Oat++ MCP implementation
A security flaw in the Oat++ implementation of Anthropic's Model Context Protocol (MCP) allows attackers to predict or capture session IDs from active AI conversations, hijack MCP sessions, and inject malicious responses via the oatpp-mcp server.…
https://go.theregister.com/feed/www.theregister.com/2025/10/21/mcp_prompt_hijacking_attack/
Related News |
25 sources
Current Date
Oct, Wed 22 - 17:28 CEST
|