CVE-2025-66414: CWE-1188: Insecure Default Initialization of Resource in modelcontextprotocol typescript-sdk
MCP TypeScript SDK is the official TypeScript SDK for Model Context Protocol servers and clients. Prior to 1.24.0, The Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with StreamableHTTPServerTransport or SSEServerTransport and has not enabled enableDnsRebindingProtection, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances. Note that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport. This vulnerability is fixed in 1.24.0.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-66414 affects the Model Context Protocol (MCP) TypeScript SDK versions earlier than 1.24.0. MCP is a protocol used for communication between servers and clients, and its TypeScript SDK facilitates development of these components. The core issue is the insecure default initialization of the DNS rebinding protection feature in HTTP-based MCP servers. DNS rebinding is a technique where an attacker manipulates DNS responses to circumvent the browser's same-origin policy, allowing malicious web pages to interact with local network services. In this case, if an MCP server is running locally on HTTP without authentication and uses either StreamableHTTPServerTransport or SSEServerTransport, and the enableDnsRebindingProtection flag is not explicitly enabled, an attacker can exploit DNS rebinding to send unauthorized requests to the local MCP server. This could lead to unauthorized invocation of tools or access to sensitive resources exposed by the MCP server, effectively allowing actions on behalf of the user. The vulnerability does not impact MCP servers using stdio transport, which are not susceptible to DNS rebinding attacks. The issue was addressed in version 1.24.0 of the SDK by enabling DNS rebinding protection by default, mitigating the risk. The CVSS 4.0 score of 7.6 reflects a high severity, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality and integrity is high, while availability is not affected. No known exploits are currently reported in the wild. Best practices recommend not running HTTP-based MCP servers locally without authentication, which further reduces risk.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if they deploy MCP TypeScript SDK-based HTTP servers locally without authentication and have not updated to version 1.24.0 or later. Attackers exploiting this vulnerability can bypass browser same-origin policies via DNS rebinding to access or manipulate local MCP services, potentially leading to unauthorized execution of commands or access to sensitive data. This could compromise confidentiality and integrity of local resources and tools interfaced through MCP servers. Organizations involved in software development, automation, or services relying on MCP for local inter-process communication are particularly at risk. The exploitation requires user interaction through a malicious website, which means phishing or social engineering could be used as attack vectors. While no widespread exploitation is reported yet, the vulnerability’s ease of exploitation and high impact necessitate prompt attention. The risk is heightened in environments where local MCP servers are run without authentication, contrary to recommended security practices. European organizations with stringent data protection regulations (e.g., GDPR) must consider the potential data confidentiality breaches and operational disruptions caused by this vulnerability.
Mitigation Recommendations
European organizations should immediately upgrade all MCP TypeScript SDK instances to version 1.24.0 or later, where DNS rebinding protection is enabled by default. For existing deployments, verify that the enableDnsRebindingProtection flag is explicitly set to true for all HTTP-based MCP servers. Avoid running MCP servers locally without authentication; implement strong authentication mechanisms to restrict access. Where possible, prefer using stdio transport for MCP servers, as it is not vulnerable to this issue. Conduct security audits to identify any MCP servers running on localhost without proper protections. Educate developers and system administrators about the risks of DNS rebinding and enforce secure coding and deployment practices. Implement network-level protections such as DNS filtering and browser security policies to reduce exposure to malicious DNS responses. Monitor network traffic and logs for unusual requests originating from web browsers to local MCP servers. Finally, incorporate this vulnerability into organizational vulnerability management and incident response plans to ensure timely detection and remediation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark
CVE-2025-66414: CWE-1188: Insecure Default Initialization of Resource in modelcontextprotocol typescript-sdk
Description
MCP TypeScript SDK is the official TypeScript SDK for Model Context Protocol servers and clients. Prior to 1.24.0, The Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with StreamableHTTPServerTransport or SSEServerTransport and has not enabled enableDnsRebindingProtection, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances. Note that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport. This vulnerability is fixed in 1.24.0.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-66414 affects the Model Context Protocol (MCP) TypeScript SDK versions earlier than 1.24.0. MCP is a protocol used for communication between servers and clients, and its TypeScript SDK facilitates development of these components. The core issue is the insecure default initialization of the DNS rebinding protection feature in HTTP-based MCP servers. DNS rebinding is a technique where an attacker manipulates DNS responses to circumvent the browser's same-origin policy, allowing malicious web pages to interact with local network services. In this case, if an MCP server is running locally on HTTP without authentication and uses either StreamableHTTPServerTransport or SSEServerTransport, and the enableDnsRebindingProtection flag is not explicitly enabled, an attacker can exploit DNS rebinding to send unauthorized requests to the local MCP server. This could lead to unauthorized invocation of tools or access to sensitive resources exposed by the MCP server, effectively allowing actions on behalf of the user. The vulnerability does not impact MCP servers using stdio transport, which are not susceptible to DNS rebinding attacks. The issue was addressed in version 1.24.0 of the SDK by enabling DNS rebinding protection by default, mitigating the risk. The CVSS 4.0 score of 7.6 reflects a high severity, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality and integrity is high, while availability is not affected. No known exploits are currently reported in the wild. Best practices recommend not running HTTP-based MCP servers locally without authentication, which further reduces risk.
Potential Impact
For European organizations, the impact of this vulnerability can be significant if they deploy MCP TypeScript SDK-based HTTP servers locally without authentication and have not updated to version 1.24.0 or later. Attackers exploiting this vulnerability can bypass browser same-origin policies via DNS rebinding to access or manipulate local MCP services, potentially leading to unauthorized execution of commands or access to sensitive data. This could compromise confidentiality and integrity of local resources and tools interfaced through MCP servers. Organizations involved in software development, automation, or services relying on MCP for local inter-process communication are particularly at risk. The exploitation requires user interaction through a malicious website, which means phishing or social engineering could be used as attack vectors. While no widespread exploitation is reported yet, the vulnerability’s ease of exploitation and high impact necessitate prompt attention. The risk is heightened in environments where local MCP servers are run without authentication, contrary to recommended security practices. European organizations with stringent data protection regulations (e.g., GDPR) must consider the potential data confidentiality breaches and operational disruptions caused by this vulnerability.
Mitigation Recommendations
European organizations should immediately upgrade all MCP TypeScript SDK instances to version 1.24.0 or later, where DNS rebinding protection is enabled by default. For existing deployments, verify that the enableDnsRebindingProtection flag is explicitly set to true for all HTTP-based MCP servers. Avoid running MCP servers locally without authentication; implement strong authentication mechanisms to restrict access. Where possible, prefer using stdio transport for MCP servers, as it is not vulnerable to this issue. Conduct security audits to identify any MCP servers running on localhost without proper protections. Educate developers and system administrators about the risks of DNS rebinding and enforce secure coding and deployment practices. Implement network-level protections such as DNS filtering and browser security policies to reduce exposure to malicious DNS responses. Monitor network traffic and logs for unusual requests originating from web browsers to local MCP servers. Finally, incorporate this vulnerability into organizational vulnerability management and incident response plans to ensure timely detection and remediation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-28T23:33:56.366Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 692f388ae0601f8fcd7a9513
Added to database: 12/2/2025, 7:05:46 PM
Last enriched: 12/2/2025, 7:20:54 PM
Last updated: 12/2/2025, 8:18:53 PM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65877: n/a
HighCVE-2025-13658: CWE-94 Improper Control of Generation of Code ('Code Injection') in Industrial Video & Control Longwatch
CriticalCVE-2025-13542: CWE-269 Improper Privilege Management in DesignThemes DesignThemes LMS
CriticalCVE-2025-13510: CWE-306 Missing Authentication for Critical Function in Iskra iHUB and iHUB Lite
CriticalCVE-2025-60736: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.