Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10193: CWE-346 Origin Validation Error in neo4j neo4j-cypher MCP server

0
High
VulnerabilityCVE-2025-10193cvecve-2025-10193cwe-346
Published: Thu Sep 11 2025 (09/11/2025, 14:05:30 UTC)
Source: CVE Database V5
Vendor/Project: neo4j
Product: neo4j-cypher MCP server

Description

DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.

AI-Powered Analysis

AILast updated: 09/19/2025, 01:03:50 UTC

Technical Analysis

CVE-2025-10193 is a high-severity vulnerability affecting the neo4j-cypher MCP server version 0.2.2. The root cause is an origin validation error classified under CWE-346, which leads to a DNS rebinding attack vector. DNS rebinding is a technique that allows a malicious website to circumvent the browser's Same-Origin Policy (SOP) by manipulating DNS responses to make the victim's browser believe that the malicious site and a local service share the same origin. In this case, the neo4j-cypher MCP server does not properly validate the origin of incoming requests, allowing unauthorized invocations of its tools. The attack requires user interaction, specifically enticing the user to visit and remain on a malicious website long enough for the DNS rebinding to succeed. Once successful, the attacker can execute unauthorized commands against the locally running Neo4j MCP instance, potentially leading to unauthorized data access or manipulation. The CVSS 4.0 score of 7.4 reflects the network attack vector, the requirement for user interaction, and the high impact on confidentiality and integrity, though with high attack complexity and partial user privileges. No known exploits are currently in the wild, and no patches have been published yet, increasing the urgency for mitigation and monitoring.

Potential Impact

For European organizations, this vulnerability poses a significant risk, especially for those using Neo4j graph database technologies in their infrastructure or applications. The ability to bypass SOP and execute unauthorized commands locally can lead to data breaches, unauthorized data manipulation, or disruption of services relying on Neo4j. Given that Neo4j is often used in data analytics, fraud detection, and network management, exploitation could compromise sensitive business intelligence and operational data. The requirement for user interaction means phishing or social engineering campaigns could be leveraged to trigger the attack, increasing the risk in environments with less stringent user awareness. Additionally, organizations with web-facing applications that integrate Neo4j or have developers accessing local Neo4j MCP servers are particularly vulnerable. The absence of patches and known exploits suggests a window of exposure, necessitating proactive defenses. The impact on confidentiality and integrity is high, while availability impact is not indicated, meaning attackers could stealthily manipulate or exfiltrate data without causing obvious service outages.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement several specific measures beyond generic advice: 1) Restrict access to the neo4j-cypher MCP server to trusted networks only, using firewall rules or network segmentation to prevent exposure to untrusted web origins. 2) Employ browser security policies such as Content Security Policy (CSP) and SameSite cookies to reduce the risk of DNS rebinding attacks from malicious websites. 3) Educate users about the risks of visiting untrusted websites and the importance of minimizing time spent on unknown domains, especially when working with local development environments. 4) Monitor network traffic and logs for unusual requests to the neo4j-cypher MCP server that could indicate attempted exploitation. 5) If possible, disable or restrict the neo4j-cypher MCP server on developer machines or production environments where it is not essential. 6) Stay alert for official patches or updates from Neo4j and plan immediate deployment once available. 7) Consider deploying web application firewalls (WAFs) or reverse proxies that can enforce stricter origin validation and block suspicious requests targeting the MCP server. These targeted mitigations will reduce the attack surface and limit the potential for successful exploitation until a patch is released.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Neo4j
Date Reserved
2025-09-09T16:04:09.860Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c2d8fd5aed1f7cf94a225a

Added to database: 9/11/2025, 2:13:17 PM

Last enriched: 9/19/2025, 1:03:50 AM

Last updated: 10/30/2025, 2:10:07 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats