Data Exfiltration Vulnerability in Anthropic's Slack Model Context Protocol Server
CVE-2025-34072
Key Information:
- Vendor
Anthropic
- Status
- Vendor
- CVE Published:
- 2 July 2025
Badges
What is CVE-2025-34072?
A vulnerability has been identified in Anthropic's deprecated Slack Model Context Protocol (MCP) Server that allows data exfiltration through automatic link unfurling. When an AI agent processes untrusted data, it can be exploited to generate messages that include malicious hyperlinks designed to extract sensitive data. The Slack link preview bots automatically make outbound requests to these attacker-controlled URLs, leading to unintended private data leakage without any user interaction.
Affected Version(s)
Slack MCP Server 0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved