
Asana, the work management platform, has notified customers of a data exposure incident involving its Model Context Protocol (MCP) AI feature. A logic flaw in the implementation potentially allowed customer data to be visible across organizational boundaries, raising concerns about AI-integrated system security1. The incident, discovered and resolved in June 2025, highlights the challenges of maintaining data isolation in complex AI-powered workflows.
Incident Overview and Technical Details
The exposure occurred in Asana’s MCP server, a component designed to allow AI tools to interact with the platform’s Work Graph through natural language processing2. According to security researchers, the flaw permitted users in one organization to view tasks and projects belonging to other organizations. The issue stemmed from an internal bug rather than external exploitation, with the company taking immediate action to shut down the affected server3.
Technical documentation reveals the MCP server operates at https://mcp.asana.com/sse
and requires OAuth2 authentication. The system supports over 30 tools for project tracking and user management, making the potential exposure scope significant4. While Asana maintains SOC 2 Type 2 and ISO 27001 certifications, this incident demonstrates how logic flaws can bypass traditional security controls in AI-integrated systems.
Security Response and Mitigation
Asana’s incident response followed established protocols, including immediate server shutdown and customer notification. The company has not disclosed whether the exposure resulted in actual data access by unauthorized parties. Security analysts note the incident highlights the need for additional safeguards in AI infrastructure, particularly around access controls and logging mechanisms5.
The MCP server’s design, while innovative for AI integration, appears to have lacked sufficient isolation checks between organizational contexts. This type of vulnerability is particularly concerning for enterprise customers who rely on strict data segregation. Asana’s security standards include AES-256 encryption at rest and TLS 1.2+ for data in transit, but these measures couldn’t prevent the logical access control failure6.
Broader Implications for AI Security
The Asana incident mirrors challenges seen in other industries implementing AI-data protocols. The Model Context Protocol aims to solve integration complexity between AI models and external data sources, but this case shows how such bridges can create new security risks7. Similar implementations, like Linear’s MCP integration, now face increased scrutiny regarding their access control implementations.
Security professionals should note several key takeaways from this incident. First, traditional security certifications don’t guarantee protection against logic flaws in new AI features. Second, the growing adoption of standardized AI-data protocols requires specialized security reviews focusing on context isolation. Finally, the incident demonstrates how AI integration points can become unexpected data leakage vectors, even in otherwise secure systems.
Recommendations for Security Teams
For organizations using or considering AI-integrated platforms, several security measures warrant consideration:
- Request detailed security architecture documentation for AI features, particularly regarding data isolation
- Implement additional monitoring for AI-integrated workflows
- Conduct targeted penetration tests focusing on cross-tenant data access scenarios
- Review vendor incident response capabilities specific to AI components
The Asana MCP incident serves as a case study in the evolving security challenges posed by AI integration. As organizations increasingly adopt these technologies, security teams must adapt their assessment frameworks to address the unique risks of AI-data interactions. Future developments in this space will likely include more robust standards for AI protocol security and increased regulatory attention on AI-related data exposures.
References
- “Asana warns MCP AI feature exposed customer data to other orgs,” BleepingComputer, [Online]. Available: https://www.bleepingcomputer.com/news/security/asana-warns-mcp-ai-feature-exposed-customer-data-to-other-orgs
- “Asana discloses data exposure bug in MCP server,” UpGuard, [Online]. Available: https://www.upguard.com/blog/asana-discloses-data-exposure-bug-in-mcp-server
- “Using Asana’s Model Control Protocol (MCP) server,” Asana Developers, [Online]. Available: https://developers.asana.com/docs/using-asanas-model-control-protocol-mcp-server
- “Model Context Protocol (MCP): Bridging the gap between AI models and real-world impact,” Fullestop Blog, [Online]. Available: https://www.fullestop.com/blog/model-context-protocol-mcp-bridging-the-gap-between-ai-models-and-real-world-impact
- “Asana Security Standards,” Asana, [Online]. Available: https://asana.com/ru/terms/security-standards
- “Biggest data breaches in healthcare,” UpGuard, [Online]. Available: https://www.upguard.com/blog/biggest-data-breaches-in-healthcare
- “Linear Changelog,” Linear, [Online]. Available: https://linear.app/changelog