In April 2026, a critical Remote Code Execution (RCE) vulnerability was discovered in several popular MCP Host applications that rely on the stdio transport layer.
The vulnerability stems from how standard input/output handles unescaped shell commands when launching child processes. If an attacker tricks a user into installing a malicious MCP server (e.g., via a typosquatted npm package like mcp-server-gihub instead of github), the server can escape the stdio stream and execute arbitrary bash/powershell commands on the host machine.
stdio to Streamable HTTP (SSE), which enforces a strict network boundary and prevents process-level escapes.mcp-verify tool to check the cryptographic signatures of MCP servers before installation.