Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25536: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in modelcontextprotocol typescript-sdk

0
High
VulnerabilityCVE-2026-25536cvecve-2026-25536cwe-362
Published: Wed Feb 04 2026 (02/04/2026, 21:29:38 UTC)
Source: CVE Database V5
Vendor/Project: modelcontextprotocol
Product: typescript-sdk

Description

CVE-2026-25536 is a high-severity race condition vulnerability in the Model Context Protocol (MCP) TypeScript SDK versions 1. 10. 0 through 1. 25. 3. It arises when a single McpServer/Server and transport instance is reused across multiple client connections, leading to cross-client response data leaks. This typically occurs in stateless StreamableHTTPServerTransport deployments. The vulnerability allows an attacker with low privileges to access sensitive data from other clients without user interaction. It impacts confidentiality significantly but has limited impact on integrity and no impact on availability. The issue has been patched in version 1.

AI-Powered Analysis

AILast updated: 02/04/2026, 21:59:50 UTC

Technical Analysis

CVE-2026-25536 is a concurrency-related vulnerability classified under CWE-362 (Race Condition) found in the Model Context Protocol (MCP) TypeScript SDK, specifically versions from 1.10.0 up to but not including 1.26.0. The MCP TypeScript SDK is used to implement servers and clients for the Model Context Protocol, facilitating communication in distributed systems. The vulnerability occurs when a single McpServer/Server and transport instance is reused across multiple client connections, a common pattern in stateless StreamableHTTPServerTransport deployments. Due to improper synchronization, concurrent execution leads to cross-client response data leakage, where response data intended for one client can be accessed by another, violating confidentiality. The flaw does not require user interaction and can be exploited remotely with low privileges, as indicated by the CVSS vector (AV:N/AC:L/PR:L/UI:N). The impact on integrity is limited, and availability is unaffected. The vulnerability was publicly disclosed and assigned CVE-2026-25536 with a CVSS v3.1 score of 7.1 (high severity). No known exploits are currently reported in the wild. The issue has been addressed in MCP TypeScript SDK version 1.26.0 by implementing proper synchronization mechanisms to isolate client responses and prevent data leakage.

Potential Impact

For European organizations, the primary impact of CVE-2026-25536 is the potential unauthorized disclosure of sensitive data across client boundaries in applications using the affected MCP TypeScript SDK versions. This can lead to breaches of confidentiality, regulatory non-compliance (e.g., GDPR), and erosion of customer trust. The vulnerability is particularly critical in multi-tenant environments or services handling sensitive or personal data where multiple clients share the same server and transport instances. Although the integrity and availability impacts are limited, the confidentiality breach alone can result in significant legal and financial consequences. Organizations relying on stateless StreamableHTTPServerTransport deployments or reusing server/transport instances without proper isolation are at higher risk. The lack of known exploits in the wild suggests limited immediate threat but does not preclude future exploitation, especially as the vulnerability is publicly known and patched. European sectors such as finance, healthcare, and government using MCP-based solutions should prioritize remediation to avoid data leaks.

Mitigation Recommendations

1. Upgrade all MCP TypeScript SDK instances to version 1.26.0 or later, where the race condition has been fixed. 2. Audit existing deployments to identify any reuse of McpServer/Server and transport instances across multiple client connections, especially in stateless StreamableHTTPServerTransport setups. 3. Refactor server implementations to ensure that each client connection uses isolated server and transport instances or that proper synchronization mechanisms are in place to prevent concurrent data leakage. 4. Implement strict access controls and monitoring to detect anomalous cross-client data access patterns. 5. Conduct thorough testing in staging environments to verify that no cross-client data leakage occurs post-mitigation. 6. Educate development and operations teams about concurrency risks and secure coding practices related to shared resource management in TypeScript SDKs. 7. Review and update incident response plans to include scenarios involving data leakage due to race conditions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.374Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6983bde5f9fa50a62fae8c8f

Added to database: 2/4/2026, 9:45:09 PM

Last enriched: 2/4/2026, 9:59:50 PM

Last updated: 2/5/2026, 12:28:14 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats