CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

ContextCrush Vulnerability in Context7 MCP Server

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A critical vulnerability, dubbed ContextCrush, in the Context7 MCP Server allows attackers to inject malicious instructions into AI development tools through trusted documentation channels. The flaw stems from unfiltered 'Custom Rules' that are delivered to AI agents without sanitization. The vulnerability could enable attackers to compromise development environments by executing harmful actions using the permissions of AI coding assistants. The issue was discovered by Noma Labs researchers and patched by Upstash on February 23, 2026.

Timeline

  1. 05.03.2026 16:00 1 articles · 4h ago

    ContextCrush Vulnerability in Context7 MCP Server Disclosed and Patched

    On February 18, 2026, Noma Labs researchers disclosed the ContextCrush vulnerability in the Context7 MCP Server. The flaw allows attackers to inject malicious instructions into AI development tools through trusted documentation channels. Upstash began remediation on February 19, 2026, and deployed a fix on February 23, 2026, introducing rule sanitization and additional safeguards. There is no evidence that the flaw was exploited in real-world attacks.

    Show sources

Information Snippets

  • ContextCrush affects the Context7 MCP Server, a tool used to deliver documentation to AI coding assistants like Cursor, Claude Code, and Windsurf.

    First reported: 05.03.2026 16:00
    1 source, 1 article
    Show sources
  • The vulnerability arises from the 'Custom Rules' feature, which allows library maintainers to provide AI-specific instructions without proper filtering or sanitization.

    First reported: 05.03.2026 16:00
    1 source, 1 article
    Show sources
  • Attackers can register a new library on Context7, insert malicious instructions, and wait for developers to query the library through their AI coding assistant.

    First reported: 05.03.2026 16:00
    1 source, 1 article
    Show sources
  • The flaw does not require direct interaction with a victim system, as the malicious instructions are distributed through Context7's infrastructure.

    First reported: 05.03.2026 16:00
    1 source, 1 article
    Show sources
  • Researchers demonstrated that poisoned library entries could compromise development environments by instructing AI assistants to search for and exfiltrate sensitive files.

    First reported: 05.03.2026 16:00
    1 source, 1 article
    Show sources
  • Upstash began remediation on February 19, 2026, and deployed a fix on February 23, 2026, introducing rule sanitization and additional safeguards.

    First reported: 05.03.2026 16:00
    1 source, 1 article
    Show sources
  • There is no evidence that the flaw was exploited in real-world attacks.

    First reported: 05.03.2026 16:00
    1 source, 1 article
    Show sources