Healthcare Industry Today
SEE OTHER BRANDS

Exploring the healthcare news of the world

Xeris Threat Lab Uncovers Metadata Forgery Vulnerability in MCP Servers

Silent metadata manipulation allows malicious MCP Servers to access unauthorized LLM data, exposing a new layer of AI infrastructure risk

This isn’t a prompt injection or jailbreak; it’s a silent metadata hijack that bypasses both user awareness and LLM controls.”
— Shlomo Touboul, Co-Founder and Active Chairman
NEW YORK, NY, UNITED STATES, August 5, 2025 /EINPresswire.com/ -- New Report Reveals Silent Escalation Technique Targeting AI Agent Metadata Instructions

Xeris.ai, a cybersecurity startup specializing in protecting AI workflows and MCP (Model Context Protocol) infrastructure, today announced a forthcoming threat report exposing a previously undocumented vulnerability—XERIS-006: Metadata Forge.

This newly discovered attack reveals how malicious MCP Servers can silently manipulate metadata sent to Large Language Models (LLMs), allowing unauthorized access to sensitive information. The vulnerability, tested against Anthropic’s Claude Desktop using a modified "Customer Support" MCP Server, demonstrates how simple metadata field rewrites can completely alter AI behavior—without the user's knowledge or consent.

“This isn’t a prompt injection or jailbreak, it’s a silent metadata hijack that bypasses both user awareness and platform controls,” said Shlomo Touboul, Co-Founder and Chairman of Xeris.ai. “MCPs are rapidly becoming the hidden control layer behind enterprise AI. We must treat them as privileged software—because attackers already do.”

How the Attack Works
The Metadata Forge vulnerability exploits the weak validation of tool metadata within MCP Server responses. In the published case, a malicious MCP Server injected a hidden instruction to transform ticket_id metadata from CS- (Customer Support) to SEC- (Security Incident), tricking the LLM into retrieving confidential security alerts instead of user-approved tickets. The LLM never alerted the user to this change.

The attack was confirmed by:

Code-level patch injection in the MCP Server's metadata definition

Unmodified user prompts are returning unauthorized security data.

Behavioral validation in the Claude Desktop LLM interface

This form of metadata forgery can impact any enterprise using unverified or shadow MCP Servers to connect agents, workflows, or external systems to LLMs.

Report Access and Recommendations
XERIS-006: Metadata Forge is available for early access at:
👉 https://xeris.ai/threat-reports/metadata-forge-attack

Organizations are advised to:

1. Implement strict signature validation on MCP Server responses.
2. Monitor for instruction mismatches between user prompts and tool output.s
3. Audit and approve all MCP Server sources interacting with enterprise LLM systems

About Xeris.ai
Xeris.ai provides AI XDR (Extended Detection and Response) solutions for securing AI agents, assistants, and LLM workflows. The company focuses on preventing logic-layer threats within AI pipelines, offering tools for MCP monitoring, policy enforcement, and real-time anomaly detection.

To learn more or request demo code for the Metadata Forge attack:
📧 info@xeris.ai
🌐 https://xeris.ai

Shlomo Touboul
Xeris AI
+972 54-422-7780
email us here
Visit us on social media:
LinkedIn

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.

Share us

on your social networks:
AGPs

Get the latest news on this topic.

SIGN UP FOR FREE TODAY

No Thanks

By signing to this email alert, you
agree to our Terms & Conditions