Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66416: CWE-1188: Insecure Default Initialization of Resource in modelcontextprotocol python-sdk

0
High
VulnerabilityCVE-2025-66416cvecve-2025-66416cwe-1188
Published: Tue Dec 02 2025 (12/02/2025, 18:14:28 UTC)
Source: CVE Database V5
Vendor/Project: modelcontextprotocol
Product: python-sdk

Description

The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Model Context Protocol (MCP). Prior to version 1.23.0, tThe Model Context Protocol (MCP) Python SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication using FastMCP with streamable HTTP or SSE transport, and has not configured TransportSecuritySettings, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances. Note that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport. This vulnerability is fixed in 1.23.0.

AI-Powered Analysis

AILast updated: 12/02/2025, 19:20:41 UTC

Technical Analysis

The Model Context Protocol (MCP) Python SDK, known as 'mcp' on PyPI, implements the MCP for local inter-process communication. Prior to version 1.23.0, the SDK did not enable DNS rebinding protection by default for HTTP-based MCP servers. DNS rebinding is an attack technique that manipulates the victim's browser to bypass same-origin policy restrictions by resolving a domain name to a local IP address after initial DNS resolution. When an MCP server is run locally on localhost without authentication, using FastMCP with streamable HTTP or Server-Sent Events (SSE) transport, and without configuring TransportSecuritySettings, a malicious website can exploit this DNS rebinding vulnerability. This enables the attacker to send unauthorized requests to the local MCP server, potentially invoking tools or accessing sensitive resources exposed by the server under the user's context. The vulnerability does not affect MCP servers using stdio transport, which is a different communication mechanism. The issue stems from insecure default initialization of security settings (CWE-1188), specifically the lack of DNS rebinding protection by default. The vulnerability has a CVSS 4.0 score of 7.6 (high severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction and partial impact on confidentiality and integrity. The vulnerability was publicly disclosed on December 2, 2025, and fixed in MCP Python SDK version 1.23.0. Best practices recommend not running HTTP-based MCP servers locally without authentication or proper transport security configurations.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for developers, data scientists, or applications that use the MCP Python SDK locally for model serving or inter-process communication. If an attacker can lure a user to a malicious website, they could exploit DNS rebinding to bypass browser same-origin policies and interact with the local MCP server. This could lead to unauthorized invocation of local tools or access to sensitive data or resources exposed by the MCP server, potentially compromising confidentiality and integrity of local operations. The impact is heightened in environments where MCP servers are run without authentication or transport security, which may be common in development or testing environments. While the vulnerability requires user interaction, the widespread use of Python and MCP in AI/ML workflows in Europe increases the attack surface. Organizations handling sensitive or regulated data (e.g., financial, healthcare, or governmental sectors) could face data breaches or operational disruptions. The vulnerability does not affect availability directly but could lead to indirect impacts if exploited for lateral movement or privilege escalation.

Mitigation Recommendations

European organizations should immediately upgrade the MCP Python SDK to version 1.23.0 or later, where DNS rebinding protection is enabled by default. For environments where upgrading is not immediately feasible, administrators should explicitly configure TransportSecuritySettings to enable DNS rebinding protection and enforce authentication on all HTTP-based MCP servers. Avoid running MCP servers on localhost without authentication or transport security, especially in production or sensitive environments. Developers should consider switching to stdio transport for MCP servers where possible, as it is not affected by this vulnerability. Network-level mitigations include restricting outbound DNS queries and monitoring for suspicious DNS rebinding patterns. Security teams should educate users about the risks of visiting untrusted websites while running local MCP servers. Finally, incorporate MCP server security checks into CI/CD pipelines and vulnerability management programs to ensure compliance with best practices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.366Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692f388ae0601f8fcd7a9517

Added to database: 12/2/2025, 7:05:46 PM

Last enriched: 12/2/2025, 7:20:41 PM

Last updated: 12/2/2025, 8:16:37 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats