An "authorized attacker" could exploit this weakness to gain elevated privileges, potentially reaching SYSTEM-level access.
As MCP servers become more popular, so do the risks. To address some of the risks many vendors have started to offer products ...