Anthropic Filesystem MCP Server: Directory Access Bypass via Improper Path Validation
Summary
Anthropic's filesystem MCP server (a tool that lets AI assistants like Claude access your computer's files) had a path validation vulnerability where it only checked if a file path started with an allowed directory name, rather than confirming it was actually in that directory. This meant if you allowed access to /mnt/finance/data, the AI could also access sibling files like /mnt/finance/data-archived because the path string starts the same way.
Solution / Mitigation
Anthropic rewrote the filesystem server to support the roots feature of MCP, and this updated release fixed the vulnerability. The vulnerability is tracked as CVE-2025-53109.
Classification
Affected Vendors
Related Issues
Original source: https://embracethered.com/blog/posts/2025/anthropic-filesystem-mcp-server-bypass/
First tracked: February 12, 2026 at 02:20 PM
Classified by LLM (prompt v3) · confidence: 95%