Claude Code OAuth Tokens Vulnerable to Stealthy MCP Hijacking
Mitiga researchers have uncovered a critical vulnerability allowing attackers to silently hijack Claude Code’s Managed Code Platform (MCP) traffic. According to SecurityWeek, this attack vector enables the interception of OAuth tokens, granting persistent unauthorized access to connected SaaS platforms.
This isn’t just about stealing a session; it’s about establishing long-term control. By redirecting MCP traffic, an attacker can effectively man-in-the-middle the authentication flow, capturing tokens that can then be used to impersonate legitimate users and interact with other integrated SaaS applications. The stealthy nature of this attack means it can go undetected, allowing adversaries to maintain a foothold within an organization’s cloud environment.
The implications for defenders are significant. OAuth tokens are the keys to the kingdom in many cloud-native architectures. Their compromise, especially through a silent traffic redirection, bypasses many traditional perimeter defenses and identity controls. Organizations leveraging Claude Code for their SaaS integrations need to urgently reassess their security posture around MCP traffic and OAuth token handling.
What This Means For You
- If your organization uses Claude Code and integrates it with other SaaS platforms, you need to immediately investigate your MCP traffic for any anomalies or unauthorized redirection. Review your OAuth token issuance and revocation policies. Assume tokens could be compromised and audit all activity from connected SaaS platforms for suspicious actions.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.