CVE-2026-34237: CWE-942: Permissive Cross-domain Policy with Untrusted Domains in modelcontextprotocol java-sdk
MCP Java SDK is the official Java SDK for Model Context Protocol servers and clients. Prior to versions 1.0.1 and 1.1.1, there is a hardcoded wildcard CORS vulnerability. This issue has been patched in versions 1.0.1 and 1.1.1.
AI Analysis
Technical Summary
CVE-2026-34237 is a vulnerability identified in the modelcontextprotocol Java SDK, specifically in versions prior to 1.0.1 and 1.1.1. The root cause is a hardcoded wildcard in the Cross-Origin Resource Sharing (CORS) policy, which is a security feature that controls how resources on a web server can be requested from another domain. The vulnerability corresponds to CWE-942, which describes permissive cross-domain policies that allow untrusted domains to access resources. In this case, the SDK's CORS implementation indiscriminately permits any origin, effectively disabling the same-origin policy protections. This can allow malicious web pages from untrusted domains to perform cross-origin requests to the vulnerable SDK endpoints, potentially leading to unauthorized data disclosure or manipulation. The CVSS v3.1 base score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction and having a scope change. The impact affects confidentiality and integrity but not availability. The vulnerability has been addressed in versions 1.0.1 and 1.1.1 of the SDK, where the CORS policy is presumably tightened to restrict allowed origins. No public exploits have been reported, but the presence of a hardcoded wildcard CORS policy represents a significant risk in web application security contexts, especially for applications relying on this SDK for cross-domain communications.
Potential Impact
The vulnerability can lead to unauthorized cross-origin requests from malicious websites, potentially exposing sensitive information or allowing attackers to perform unauthorized actions within the context of the vulnerable SDK. This compromises confidentiality and integrity of data handled by applications using the affected SDK versions. While availability is not impacted, the breach of confidentiality and integrity can have serious consequences, such as data leaks, session hijacking, or unauthorized command execution within the application context. Organizations relying on the modelcontextprotocol Java SDK in web applications or services that handle sensitive or regulated data are at risk. The ease of exploitation is relatively high due to the network attack vector and lack of required privileges, although user interaction is necessary. This vulnerability could be leveraged in targeted phishing or social engineering attacks to trick users into visiting malicious sites that exploit the permissive CORS policy. The scope is broad as it affects all deployments using the vulnerable SDK versions, potentially impacting a wide range of industries and sectors worldwide.
Mitigation Recommendations
The primary mitigation is to upgrade the modelcontextprotocol Java SDK to version 1.0.1 or 1.1.1 or later, where the vulnerability has been patched. Organizations should audit their current SDK versions and prioritize patching in development, staging, and production environments. Additionally, review and enforce strict CORS policies on all web-facing services, explicitly specifying trusted domains rather than using wildcards. Implement Content Security Policy (CSP) headers to restrict resource loading and reduce the risk of cross-origin attacks. Conduct security testing to verify that no other components or custom configurations introduce similar permissive CORS settings. Educate developers and security teams about the risks of overly permissive CORS configurations and incorporate secure coding practices for cross-domain communications. Monitor network traffic for unusual cross-origin requests that could indicate exploitation attempts. Finally, consider implementing web application firewalls (WAFs) with rules to detect and block suspicious CORS-related activities.
Affected Countries
United States, Germany, United Kingdom, India, Japan, South Korea, Canada, Australia, France, Netherlands
CVE-2026-34237: CWE-942: Permissive Cross-domain Policy with Untrusted Domains in modelcontextprotocol java-sdk
Description
MCP Java SDK is the official Java SDK for Model Context Protocol servers and clients. Prior to versions 1.0.1 and 1.1.1, there is a hardcoded wildcard CORS vulnerability. This issue has been patched in versions 1.0.1 and 1.1.1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-34237 is a vulnerability identified in the modelcontextprotocol Java SDK, specifically in versions prior to 1.0.1 and 1.1.1. The root cause is a hardcoded wildcard in the Cross-Origin Resource Sharing (CORS) policy, which is a security feature that controls how resources on a web server can be requested from another domain. The vulnerability corresponds to CWE-942, which describes permissive cross-domain policies that allow untrusted domains to access resources. In this case, the SDK's CORS implementation indiscriminately permits any origin, effectively disabling the same-origin policy protections. This can allow malicious web pages from untrusted domains to perform cross-origin requests to the vulnerable SDK endpoints, potentially leading to unauthorized data disclosure or manipulation. The CVSS v3.1 base score is 6.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but requiring user interaction and having a scope change. The impact affects confidentiality and integrity but not availability. The vulnerability has been addressed in versions 1.0.1 and 1.1.1 of the SDK, where the CORS policy is presumably tightened to restrict allowed origins. No public exploits have been reported, but the presence of a hardcoded wildcard CORS policy represents a significant risk in web application security contexts, especially for applications relying on this SDK for cross-domain communications.
Potential Impact
The vulnerability can lead to unauthorized cross-origin requests from malicious websites, potentially exposing sensitive information or allowing attackers to perform unauthorized actions within the context of the vulnerable SDK. This compromises confidentiality and integrity of data handled by applications using the affected SDK versions. While availability is not impacted, the breach of confidentiality and integrity can have serious consequences, such as data leaks, session hijacking, or unauthorized command execution within the application context. Organizations relying on the modelcontextprotocol Java SDK in web applications or services that handle sensitive or regulated data are at risk. The ease of exploitation is relatively high due to the network attack vector and lack of required privileges, although user interaction is necessary. This vulnerability could be leveraged in targeted phishing or social engineering attacks to trick users into visiting malicious sites that exploit the permissive CORS policy. The scope is broad as it affects all deployments using the vulnerable SDK versions, potentially impacting a wide range of industries and sectors worldwide.
Mitigation Recommendations
The primary mitigation is to upgrade the modelcontextprotocol Java SDK to version 1.0.1 or 1.1.1 or later, where the vulnerability has been patched. Organizations should audit their current SDK versions and prioritize patching in development, staging, and production environments. Additionally, review and enforce strict CORS policies on all web-facing services, explicitly specifying trusted domains rather than using wildcards. Implement Content Security Policy (CSP) headers to restrict resource loading and reduce the risk of cross-origin attacks. Conduct security testing to verify that no other components or custom configurations introduce similar permissive CORS settings. Educate developers and security teams about the risks of overly permissive CORS configurations and incorporate secure coding practices for cross-domain communications. Monitor network traffic for unusual cross-origin requests that could indicate exploitation attempts. Finally, consider implementing web application firewalls (WAFs) with rules to detect and block suspicious CORS-related activities.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-26T16:22:29.034Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69cbedf2e6bfc5ba1d248101
Added to database: 3/31/2026, 3:53:22 PM
Last enriched: 3/31/2026, 4:09:51 PM
Last updated: 4/1/2026, 3:55:58 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.