Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66414: CWE-1188: Insecure Default Initialization of Resource in modelcontextprotocol typescript-sdk

0
High
VulnerabilityCVE-2025-66414cvecve-2025-66414cwe-1188
Published: Tue Dec 02 2025 (12/02/2025, 18:12:29 UTC)
Source: CVE Database V5
Vendor/Project: modelcontextprotocol
Product: typescript-sdk

Description

MCP TypeScript SDK is the official TypeScript SDK for Model Context Protocol servers and clients. Prior to 1.24.0, The Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with StreamableHTTPServerTransport or SSEServerTransport and has not enabled enableDnsRebindingProtection, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances. Note that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport. This vulnerability is fixed in 1.24.0.

AI-Powered Analysis

AILast updated: 12/02/2025, 19:20:54 UTC

Technical Analysis

The vulnerability identified as CVE-2025-66414 affects the Model Context Protocol (MCP) TypeScript SDK versions earlier than 1.24.0. MCP is a protocol used for communication between servers and clients, and its TypeScript SDK facilitates development of these components. The core issue is the insecure default initialization of the DNS rebinding protection feature in HTTP-based MCP servers. DNS rebinding is a technique where an attacker manipulates DNS responses to circumvent the browser's same-origin policy, allowing malicious web pages to interact with local network services. In this case, if an MCP server is running locally on HTTP without authentication and uses either StreamableHTTPServerTransport or SSEServerTransport, and the enableDnsRebindingProtection flag is not explicitly enabled, an attacker can exploit DNS rebinding to send unauthorized requests to the local MCP server. This could lead to unauthorized invocation of tools or access to sensitive resources exposed by the MCP server, effectively allowing actions on behalf of the user. The vulnerability does not impact MCP servers using stdio transport, which are not susceptible to DNS rebinding attacks. The issue was addressed in version 1.24.0 of the SDK by enabling DNS rebinding protection by default, mitigating the risk. The CVSS 4.0 score of 7.6 reflects a high severity, with network attack vector, low attack complexity, no privileges required, but requiring user interaction. The impact on confidentiality and integrity is high, while availability is not affected. No known exploits are currently reported in the wild. Best practices recommend not running HTTP-based MCP servers locally without authentication, which further reduces risk.

Potential Impact

For European organizations, the impact of this vulnerability can be significant if they deploy MCP TypeScript SDK-based HTTP servers locally without authentication and have not updated to version 1.24.0 or later. Attackers exploiting this vulnerability can bypass browser same-origin policies via DNS rebinding to access or manipulate local MCP services, potentially leading to unauthorized execution of commands or access to sensitive data. This could compromise confidentiality and integrity of local resources and tools interfaced through MCP servers. Organizations involved in software development, automation, or services relying on MCP for local inter-process communication are particularly at risk. The exploitation requires user interaction through a malicious website, which means phishing or social engineering could be used as attack vectors. While no widespread exploitation is reported yet, the vulnerability’s ease of exploitation and high impact necessitate prompt attention. The risk is heightened in environments where local MCP servers are run without authentication, contrary to recommended security practices. European organizations with stringent data protection regulations (e.g., GDPR) must consider the potential data confidentiality breaches and operational disruptions caused by this vulnerability.

Mitigation Recommendations

European organizations should immediately upgrade all MCP TypeScript SDK instances to version 1.24.0 or later, where DNS rebinding protection is enabled by default. For existing deployments, verify that the enableDnsRebindingProtection flag is explicitly set to true for all HTTP-based MCP servers. Avoid running MCP servers locally without authentication; implement strong authentication mechanisms to restrict access. Where possible, prefer using stdio transport for MCP servers, as it is not vulnerable to this issue. Conduct security audits to identify any MCP servers running on localhost without proper protections. Educate developers and system administrators about the risks of DNS rebinding and enforce secure coding and deployment practices. Implement network-level protections such as DNS filtering and browser security policies to reduce exposure to malicious DNS responses. Monitor network traffic and logs for unusual requests originating from web browsers to local MCP servers. Finally, incorporate this vulnerability into organizational vulnerability management and incident response plans to ensure timely detection and remediation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.366Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692f388ae0601f8fcd7a9513

Added to database: 12/2/2025, 7:05:46 PM

Last enriched: 12/2/2025, 7:20:54 PM

Last updated: 12/2/2025, 8:18:53 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats