Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64443: CWE-749: Exposed Dangerous Method or Function in docker mcp-gateway

0
High
VulnerabilityCVE-2025-64443cvecve-2025-64443cwe-749
Published: Wed Dec 03 2025 (12/03/2025, 17:41:59 UTC)
Source: CVE Database V5
Vendor/Project: docker
Product: mcp-gateway

Description

MCP Gateway allows easy and secure running and deployment of MCP servers. In versions 0.27.0 and earlier, when MCP Gateway runs in sse or streaming transport mode, it is vulnerable to DNS rebinding. An attacker who can get a victim to visit a malicious website or be served a malicious advertisement can perform browser-based exploitation of MCP servers executing behind the gateway, including manipulating tools or other features exposed by those MCP servers. MCP Gateway is not affected when running in the default stdio mode, which does not listen on network ports. Version 0.28.0 fixes this issue.

AI-Powered Analysis

AILast updated: 12/03/2025, 18:13:59 UTC

Technical Analysis

CVE-2025-64443 is a vulnerability categorized under CWE-749 (Exposed Dangerous Method or Function) affecting docker's MCP Gateway software versions earlier than 0.28.0. MCP Gateway facilitates the deployment and operation of MCP servers and supports multiple transport modes, including stdio, sse, and streaming. The vulnerability specifically manifests when MCP Gateway runs in sse or streaming transport modes, which listen on network ports and are susceptible to DNS rebinding attacks. DNS rebinding is a technique that tricks a victim's browser into bypassing same-origin policies by resolving a domain name to different IP addresses, allowing attackers to interact with internal network services. In this case, an attacker can entice a user to visit a malicious website or be served a malicious advertisement, which then exploits the DNS rebinding flaw to access MCP servers behind the gateway. This access enables the attacker to manipulate tools or features exposed by those MCP servers, potentially leading to unauthorized actions or data exposure. The default stdio mode does not listen on network ports and is therefore not vulnerable. The vulnerability has a CVSS 4.0 base score of 7.3, indicating high severity, with network attack vector, low attack complexity, no privileges required, but user interaction needed. The impact on confidentiality is low, but integrity and availability impacts are high, with high scope and security requirements. No known exploits have been reported in the wild as of the publication date. The issue is resolved in MCP Gateway version 0.28.0, which should be adopted promptly to mitigate the risk.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially to those deploying MCP Gateway in sse or streaming modes within their container orchestration or microservices infrastructure. Successful exploitation can lead to unauthorized manipulation of MCP servers, potentially disrupting critical services or altering configurations, thereby impacting service integrity and availability. Confidential data exposure risk is lower but not negligible if attacker-controlled commands access sensitive information. The requirement for user interaction (visiting a malicious site or ad) means phishing or social engineering campaigns could be leveraged. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that rely on containerized environments and MCP Gateway for deployment automation are particularly vulnerable. The vulnerability could facilitate lateral movement within internal networks or serve as a foothold for further attacks. Given the high adoption of Docker and container technologies across Europe, the threat surface is substantial. The absence of known exploits in the wild provides a window for proactive mitigation, but the ease of exploitation via browser-based vectors necessitates urgent attention.

Mitigation Recommendations

1. Upgrade MCP Gateway to version 0.28.0 or later immediately to eliminate the vulnerability. 2. If upgrading is not immediately feasible, configure MCP Gateway to run exclusively in stdio mode, which is not vulnerable as it does not listen on network ports. 3. Implement network-level protections such as DNS rebinding mitigations on corporate DNS resolvers and firewalls, including enforcing strict same-origin policies and blocking suspicious DNS responses. 4. Employ web filtering and ad-blocking solutions to reduce exposure to malicious websites and advertisements that could trigger exploitation. 5. Educate users about the risks of visiting untrusted websites and the dangers of phishing campaigns that could lead to exploitation. 6. Monitor network traffic for unusual connections to MCP Gateway ports, especially from internal hosts that may have been compromised via browser-based attacks. 7. Conduct regular security assessments and penetration tests focusing on container orchestration components and gateway services. 8. Apply strict access controls and network segmentation to limit exposure of MCP Gateway instances to only trusted networks and users.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-03T22:12:51.366Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69307b19b129615efa193349

Added to database: 12/3/2025, 6:02:01 PM

Last enriched: 12/3/2025, 6:13:59 PM

Last updated: 12/5/2025, 1:22:14 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats