CVE-2025-59163: CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action in safedep vet
vet is an open source software supply chain security tool. Versions 1.12.4 and below are vulnerable to a DNS rebinding attack due to lack of HTTP Host and Origin header validation. Data from the vet scan sqlite3 database may be exposed to remote attackers when vet is used as an MCP server in SSE mode with default ports through the sqlite3 query MCP tool. This issue is fixed in version 1.12.5.
AI Analysis
Technical Summary
CVE-2025-59163 is a vulnerability identified in the open-source software supply chain security tool 'vet' developed by safedep. Versions prior to 1.12.5 are affected. The vulnerability arises from the software's reliance on reverse DNS resolution for security-critical actions without proper validation of HTTP Host and Origin headers. This flaw enables a DNS rebinding attack, where an attacker can manipulate DNS responses to bypass same-origin policies and interact with the vet server as if from a trusted origin. Specifically, when vet is deployed as an MCP (Message Control Protocol) server in Server-Sent Events (SSE) mode using default ports, the sqlite3 database used by vet for scan data storage can be exposed to remote attackers. The attacker could exploit this to query sensitive data from the sqlite3 database through the MCP query tool interface. The vulnerability is classified under CWE-350, which relates to reliance on reverse DNS resolution for security decisions, a practice that is inherently insecure due to the possibility of DNS spoofing or rebinding. The CVSS 4.0 score is 2.1 (low severity), reflecting the requirement for user interaction, high attack complexity, and limited confidentiality impact. No known exploits are currently reported in the wild. The issue is resolved in version 1.12.5 of vet by presumably adding proper validation of HTTP headers and mitigating the DNS rebinding attack vector.
Potential Impact
For European organizations using safedep's vet tool versions below 1.12.5, this vulnerability could lead to unauthorized exposure of sensitive scan data stored in the sqlite3 database. Since vet is a supply chain security tool, the data it holds may include information about software dependencies, vulnerabilities, and security posture, which if leaked, could aid attackers in crafting targeted attacks or supply chain compromises. The impact is primarily on confidentiality, with no direct integrity or availability effects reported. However, the exposure of sensitive security data could indirectly facilitate further attacks. The low CVSS score suggests exploitation is non-trivial and requires user interaction, limiting widespread impact. Nonetheless, organizations relying on vet in MCP SSE mode with default ports are at risk, especially if the vet server is accessible from untrusted networks. Given the increasing focus on software supply chain security in Europe, any data leakage in this domain is concerning. The vulnerability does not appear to allow remote code execution or system takeover, but the confidentiality breach could undermine trust in supply chain security processes.
Mitigation Recommendations
European organizations should immediately upgrade safedep vet to version 1.12.5 or later to remediate this vulnerability. If upgrading is not immediately feasible, organizations should restrict network access to the vet MCP server, especially blocking untrusted external access to the default SSE ports. Implement network segmentation and firewall rules to limit vet server communication to trusted internal hosts only. Additionally, organizations should audit their deployment configurations to ensure that HTTP Host and Origin headers are validated, or apply custom reverse proxies that enforce strict header validation and prevent DNS rebinding attacks. Monitoring network traffic for unusual DNS queries or unexpected connections to the vet server can help detect exploitation attempts. Finally, reviewing and securing the sqlite3 database file permissions and access controls will reduce the risk of unauthorized data exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-59163: CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action in safedep vet
Description
vet is an open source software supply chain security tool. Versions 1.12.4 and below are vulnerable to a DNS rebinding attack due to lack of HTTP Host and Origin header validation. Data from the vet scan sqlite3 database may be exposed to remote attackers when vet is used as an MCP server in SSE mode with default ports through the sqlite3 query MCP tool. This issue is fixed in version 1.12.5.
AI-Powered Analysis
Technical Analysis
CVE-2025-59163 is a vulnerability identified in the open-source software supply chain security tool 'vet' developed by safedep. Versions prior to 1.12.5 are affected. The vulnerability arises from the software's reliance on reverse DNS resolution for security-critical actions without proper validation of HTTP Host and Origin headers. This flaw enables a DNS rebinding attack, where an attacker can manipulate DNS responses to bypass same-origin policies and interact with the vet server as if from a trusted origin. Specifically, when vet is deployed as an MCP (Message Control Protocol) server in Server-Sent Events (SSE) mode using default ports, the sqlite3 database used by vet for scan data storage can be exposed to remote attackers. The attacker could exploit this to query sensitive data from the sqlite3 database through the MCP query tool interface. The vulnerability is classified under CWE-350, which relates to reliance on reverse DNS resolution for security decisions, a practice that is inherently insecure due to the possibility of DNS spoofing or rebinding. The CVSS 4.0 score is 2.1 (low severity), reflecting the requirement for user interaction, high attack complexity, and limited confidentiality impact. No known exploits are currently reported in the wild. The issue is resolved in version 1.12.5 of vet by presumably adding proper validation of HTTP headers and mitigating the DNS rebinding attack vector.
Potential Impact
For European organizations using safedep's vet tool versions below 1.12.5, this vulnerability could lead to unauthorized exposure of sensitive scan data stored in the sqlite3 database. Since vet is a supply chain security tool, the data it holds may include information about software dependencies, vulnerabilities, and security posture, which if leaked, could aid attackers in crafting targeted attacks or supply chain compromises. The impact is primarily on confidentiality, with no direct integrity or availability effects reported. However, the exposure of sensitive security data could indirectly facilitate further attacks. The low CVSS score suggests exploitation is non-trivial and requires user interaction, limiting widespread impact. Nonetheless, organizations relying on vet in MCP SSE mode with default ports are at risk, especially if the vet server is accessible from untrusted networks. Given the increasing focus on software supply chain security in Europe, any data leakage in this domain is concerning. The vulnerability does not appear to allow remote code execution or system takeover, but the confidentiality breach could undermine trust in supply chain security processes.
Mitigation Recommendations
European organizations should immediately upgrade safedep vet to version 1.12.5 or later to remediate this vulnerability. If upgrading is not immediately feasible, organizations should restrict network access to the vet MCP server, especially blocking untrusted external access to the default SSE ports. Implement network segmentation and firewall rules to limit vet server communication to trusted internal hosts only. Additionally, organizations should audit their deployment configurations to ensure that HTTP Host and Origin headers are validated, or apply custom reverse proxies that enforce strict header validation and prevent DNS rebinding attacks. Monitoring network traffic for unusual DNS queries or unexpected connections to the vet server can help detect exploitation attempts. Finally, reviewing and securing the sqlite3 database file permissions and access controls will reduce the risk of unauthorized data exposure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-09T15:23:16.328Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68db1fa7a473ffe031e278bb
Added to database: 9/30/2025, 12:09:11 AM
Last enriched: 9/30/2025, 12:11:28 AM
Last updated: 10/3/2025, 12:10:35 AM
Views: 9
Related Threats
CVE-2025-61847
LowCVE-2025-59300: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumCVE-2025-59299: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumCVE-2025-59298: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumCVE-2025-59297: CWE-787 Out-Of-Bounds Write in Delta Electronics DIAScreen
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.