Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34237: CWE-942: Permissive Cross-domain Policy with Untrusted Domains in modelcontextprotocol java-sdk

0
Medium
VulnerabilityCVE-2026-34237cvecve-2026-34237cwe-942
Published: Tue Mar 31 2026 (03/31/2026, 15:40:01 UTC)
Source: CVE Database V5
Vendor/Project: modelcontextprotocol
Product: java-sdk

Description

MCP Java SDK is the official Java SDK for Model Context Protocol servers and clients. Prior to versions 1.0.1 and 1.1.1, there is a hardcoded wildcard CORS vulnerability. This issue has been patched in versions 1.0.1 and 1.1.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/31/2026, 16:09:51 UTC

Technical Analysis

CVE-2026-34237 is a vulnerability identified in the modelcontextprotocol Java SDK, specifically in versions prior to 1.0.1 and 1.1.1. The root cause is a hardcoded wildcard in the Cross-Origin Resource Sharing (CORS) policy, which is a security feature that controls how resources on a web server can be requested from another domain. The vulnerability corresponds to CWE-942, which describes permissive cross-domain policies that allow untrusted domains to access resources. In this case, the SDK's CORS implementation indiscriminately permits any origin, effectively disabling the same-origin policy protections. This can allow malicious web pages from untrusted domains to perform cross-origin requests to the vulnerable SDK endpoints, potentially leading to unauthorized data disclosure or manipulation. The CVSS v3.1 base score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction and having a scope change. The impact affects confidentiality and integrity but not availability. The vulnerability has been addressed in versions 1.0.1 and 1.1.1 of the SDK, where the CORS policy is presumably tightened to restrict allowed origins. No public exploits have been reported, but the presence of a hardcoded wildcard CORS policy represents a significant risk in web application security contexts, especially for applications relying on this SDK for cross-domain communications.

Potential Impact

The vulnerability can lead to unauthorized cross-origin requests from malicious websites, potentially exposing sensitive information or allowing attackers to perform unauthorized actions within the context of the vulnerable SDK. This compromises confidentiality and integrity of data handled by applications using the affected SDK versions. While availability is not impacted, the breach of confidentiality and integrity can have serious consequences, such as data leaks, session hijacking, or unauthorized command execution within the application context. Organizations relying on the modelcontextprotocol Java SDK in web applications or services that handle sensitive or regulated data are at risk. The ease of exploitation is relatively high due to the network attack vector and lack of required privileges, although user interaction is necessary. This vulnerability could be leveraged in targeted phishing or social engineering attacks to trick users into visiting malicious sites that exploit the permissive CORS policy. The scope is broad as it affects all deployments using the vulnerable SDK versions, potentially impacting a wide range of industries and sectors worldwide.

Mitigation Recommendations

The primary mitigation is to upgrade the modelcontextprotocol Java SDK to version 1.0.1 or 1.1.1 or later, where the vulnerability has been patched. Organizations should audit their current SDK versions and prioritize patching in development, staging, and production environments. Additionally, review and enforce strict CORS policies on all web-facing services, explicitly specifying trusted domains rather than using wildcards. Implement Content Security Policy (CSP) headers to restrict resource loading and reduce the risk of cross-origin attacks. Conduct security testing to verify that no other components or custom configurations introduce similar permissive CORS settings. Educate developers and security teams about the risks of overly permissive CORS configurations and incorporate secure coding practices for cross-domain communications. Monitor network traffic for unusual cross-origin requests that could indicate exploitation attempts. Finally, consider implementing web application firewalls (WAFs) with rules to detect and block suspicious CORS-related activities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-26T16:22:29.034Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69cbedf2e6bfc5ba1d248101

Added to database: 3/31/2026, 3:53:22 PM

Last enriched: 3/31/2026, 4:09:51 PM

Last updated: 4/1/2026, 3:55:58 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses