DNS Rebinding Vulnerability in MCP Python SDK by Model Context Protocol
CVE-2025-66416

7.6HIGH

Key Information:

Vendor
CVE Published:
2 December 2025

What is CVE-2025-66416?

The MCP Python SDK, which implements the Model Context Protocol, poses a security risk due to the lack of default DNS rebinding protection for HTTP-based servers prior to version 1.23.0. If an MCP server runs without authentication on localhost using FastMCP with streamable HTTP or SSE transport, attackers could exploit this gap. Malicious websites may leverage DNS rebinding to circumvent same-origin policy safeguards, potentially allowing them to execute unauthorized requests on the local MCP server. This vulnerability highlights the importance of securing local servers and adhering to best security practices when using the MCP SDK.

Affected Version(s)

python-sdk < 1.23.0

References

CVSS V4

Score:
7.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.