Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-34742: CWE-1188: Insecure Default Initialization of Resource in modelcontextprotocol go-sdk

0
High
VulnerabilityCVE-2026-34742cvecve-2026-34742cwe-1188
Published: Thu Apr 02 2026 (04/02/2026, 18:32:34 UTC)
Source: CVE Database V5
Vendor/Project: modelcontextprotocol
Product: go-sdk

Description

The Go MCP SDK used Go's standard encoding/json. Prior to version 1.4.0, the Model Context Protocol (MCP) Go SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with StreamableHTTPHandler or SSEHandler, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances. This issue has been patched in version 1.4.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 19:28:38 UTC

Technical Analysis

The vulnerability identified as CVE-2026-34742 affects the Model Context Protocol (MCP) Go SDK prior to version 1.4.0. The root cause is the insecure default initialization of the DNS rebinding protection mechanism in HTTP-based MCP servers. Specifically, the SDK uses Go's standard encoding/json package and does not enable DNS rebinding protection by default when the server is run on localhost without authentication, particularly with StreamableHTTPHandler or SSEHandler. DNS rebinding attacks exploit the ability to manipulate DNS responses to bypass the browser's same-origin policy, allowing a malicious website to send unauthorized HTTP requests to the local MCP server. This can lead to unauthorized invocation of tools or access to sensitive resources exposed by the MCP server, effectively allowing attackers to act on behalf of the user under limited conditions. The vulnerability is classified under CWE-1188, which concerns insecure default initialization of resources. The issue was publicly disclosed on April 2, 2026, and has been addressed in MCP Go SDK version 1.4.0 by enabling DNS rebinding protection by default. The CVSS v4.0 base score is 7.6 (high severity), reflecting network attack vector, low complexity, partial attack complexity, no privileges required, user interaction required, and high impact on confidentiality and integrity. No known exploits have been reported in the wild as of now.

Potential Impact

Organizations using the MCP Go SDK versions prior to 1.4.0 and running HTTP-based MCP servers locally without authentication are at risk of DNS rebinding attacks. Such attacks can bypass browser same-origin policies, allowing malicious websites to send unauthorized requests to local MCP servers. This can lead to unauthorized execution of commands, access to sensitive data, or manipulation of local resources exposed by the MCP server. The impact is particularly significant in development, testing, or internal environments where authentication is not enforced. If exploited, attackers could leverage this to compromise local systems, escalate privileges, or pivot within internal networks. The vulnerability affects confidentiality and integrity severely, while availability impact is minimal. Given the network attack vector and ease of exploitation with user interaction, the threat poses a substantial risk to organizations relying on vulnerable MCP SDK versions, especially those exposing MCP servers on localhost without proper security controls.

Mitigation Recommendations

To mitigate this vulnerability, organizations should upgrade the MCP Go SDK to version 1.4.0 or later, where DNS rebinding protection is enabled by default. For environments where immediate upgrade is not feasible, administrators should manually enable DNS rebinding protection mechanisms if supported by the SDK or implement network-level controls such as firewall rules to restrict access to the MCP server on localhost. Additionally, avoid running MCP HTTP servers without authentication, especially when using StreamableHTTPHandler or SSEHandler. Employ strict Content Security Policies (CSP) and browser security settings to limit the ability of malicious websites to perform DNS rebinding attacks. Monitoring and logging access to MCP servers can help detect suspicious activities. Finally, educate developers and system administrators about the risks of DNS rebinding and the importance of secure default configurations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-30T19:17:10.224Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69cec35ae6bfc5ba1dfb4cd2

Added to database: 4/2/2026, 7:28:26 PM

Last enriched: 4/2/2026, 7:28:38 PM

Last updated: 4/3/2026, 5:53:17 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses