CVE-2025-59163: CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action in safedep vet
vet is an open source software supply chain security tool. Versions 1.12.4 and below are vulnerable to a DNS rebinding attack due to lack of HTTP Host and Origin header validation. Data from the vet scan sqlite3 database may be exposed to remote attackers when vet is used as an MCP server in SSE mode with default ports through the sqlite3 query MCP tool. This issue is fixed in version 1.12.5.
AI Analysis
Technical Summary
CVE-2025-59163 is a vulnerability in the safedep 'vet' tool, an open source software supply chain security scanner. Versions prior to 1.12.5 fail to properly validate HTTP Host and Origin headers, relying instead on reverse DNS resolution for security-critical decisions. This design flaw (CWE-350) allows a DNS rebinding attack, where an attacker manipulates DNS responses to make a victim's browser or client interact with a malicious server as if it were a trusted local resource. Specifically, when vet operates as an MCP server in Server-Sent Events (SSE) mode on default ports, the sqlite3 query MCP tool can be tricked into exposing sensitive scan data stored in the sqlite3 database. The attack requires user interaction and has high complexity due to the need to orchestrate DNS rebinding and SSE communication. The vulnerability impacts confidentiality by potentially exposing sensitive supply chain scan data but does not affect integrity or availability. The issue is resolved in version 1.12.5 by adding proper validation of HTTP Host and Origin headers to prevent DNS rebinding. No public exploits are known, and the CVSS 4.0 base score is 2.1, reflecting low severity due to limited exploitability and impact scope.
Potential Impact
For European organizations relying on safedep vet for software supply chain security, this vulnerability could lead to unauthorized disclosure of sensitive scan data stored in the sqlite3 database. Such data may include details about software components, vulnerabilities, or internal infrastructure, which could aid attackers in further attacks or intellectual property theft. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations using vet as an MCP server in SSE mode on default ports are at risk, especially if exposed to untrusted networks or if users can be tricked into interacting with malicious sites. While the low CVSS score and high attack complexity reduce immediate risk, the exposure of supply chain security data could have downstream effects on trust and compliance, particularly under European data protection regulations. The absence of known exploits suggests limited active threat but patching remains critical to prevent future exploitation.
Mitigation Recommendations
European organizations should upgrade all instances of safedep vet to version 1.12.5 or later immediately to remediate this vulnerability. Until upgraded, restrict network exposure of vet MCP servers operating in SSE mode by limiting access to trusted internal networks and enforcing strict firewall rules on default ports. Implement network segmentation to isolate vet servers from untrusted endpoints and external internet access. Educate users about the risks of interacting with untrusted websites that could trigger DNS rebinding attacks. Monitor network traffic for unusual DNS queries or SSE connections indicative of exploitation attempts. Additionally, review and harden HTTP header validation policies in any custom integrations with vet. Regularly audit supply chain security tools and their configurations to ensure they follow best practices for secure communication and data handling.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-59163: CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action in safedep vet
Description
vet is an open source software supply chain security tool. Versions 1.12.4 and below are vulnerable to a DNS rebinding attack due to lack of HTTP Host and Origin header validation. Data from the vet scan sqlite3 database may be exposed to remote attackers when vet is used as an MCP server in SSE mode with default ports through the sqlite3 query MCP tool. This issue is fixed in version 1.12.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-59163 is a vulnerability in the safedep 'vet' tool, an open source software supply chain security scanner. Versions prior to 1.12.5 fail to properly validate HTTP Host and Origin headers, relying instead on reverse DNS resolution for security-critical decisions. This design flaw (CWE-350) allows a DNS rebinding attack, where an attacker manipulates DNS responses to make a victim's browser or client interact with a malicious server as if it were a trusted local resource. Specifically, when vet operates as an MCP server in Server-Sent Events (SSE) mode on default ports, the sqlite3 query MCP tool can be tricked into exposing sensitive scan data stored in the sqlite3 database. The attack requires user interaction and has high complexity due to the need to orchestrate DNS rebinding and SSE communication. The vulnerability impacts confidentiality by potentially exposing sensitive supply chain scan data but does not affect integrity or availability. The issue is resolved in version 1.12.5 by adding proper validation of HTTP Host and Origin headers to prevent DNS rebinding. No public exploits are known, and the CVSS 4.0 base score is 2.1, reflecting low severity due to limited exploitability and impact scope.
Potential Impact
For European organizations relying on safedep vet for software supply chain security, this vulnerability could lead to unauthorized disclosure of sensitive scan data stored in the sqlite3 database. Such data may include details about software components, vulnerabilities, or internal infrastructure, which could aid attackers in further attacks or intellectual property theft. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations using vet as an MCP server in SSE mode on default ports are at risk, especially if exposed to untrusted networks or if users can be tricked into interacting with malicious sites. While the low CVSS score and high attack complexity reduce immediate risk, the exposure of supply chain security data could have downstream effects on trust and compliance, particularly under European data protection regulations. The absence of known exploits suggests limited active threat but patching remains critical to prevent future exploitation.
Mitigation Recommendations
European organizations should upgrade all instances of safedep vet to version 1.12.5 or later immediately to remediate this vulnerability. Until upgraded, restrict network exposure of vet MCP servers operating in SSE mode by limiting access to trusted internal networks and enforcing strict firewall rules on default ports. Implement network segmentation to isolate vet servers from untrusted endpoints and external internet access. Educate users about the risks of interacting with untrusted websites that could trigger DNS rebinding attacks. Monitor network traffic for unusual DNS queries or SSE connections indicative of exploitation attempts. Additionally, review and harden HTTP header validation policies in any custom integrations with vet. Regularly audit supply chain security tools and their configurations to ensure they follow best practices for secure communication and data handling.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-09T15:23:16.328Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68db1fa7a473ffe031e278bb
Added to database: 9/30/2025, 12:09:11 AM
Last enriched: 10/7/2025, 12:48:07 AM
Last updated: 11/14/2025, 3:23:15 PM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13168: SQL Injection in ury-erp ury
MediumCVE-2023-4273: Stack-based Buffer Overflow in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2023-4194: Incorrect Authorization in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2023-3773: Out-of-bounds Read in Red Hat Red Hat Enterprise Linux 9
MediumCVE-2023-3640: Observable Discrepancy in Red Hat Red Hat Enterprise Linux 9
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.