DNS Rebinding Vulnerability in MCP Python SDK by Model Context Protocol
CVE-2025-66416
What is CVE-2025-66416?
The MCP Python SDK, which implements the Model Context Protocol, poses a security risk due to the lack of default DNS rebinding protection for HTTP-based servers prior to version 1.23.0. If an MCP server runs without authentication on localhost using FastMCP with streamable HTTP or SSE transport, attackers could exploit this gap. Malicious websites may leverage DNS rebinding to circumvent same-origin policy safeguards, potentially allowing them to execute unauthorized requests on the local MCP server. This vulnerability highlights the importance of securing local servers and adhering to best security practices when using the MCP SDK.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
python-sdk < 1.23.0
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved
