Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vcqx-v2mg-7chx

Опубликовано: 11 сент. 2025
Источник: github
Github: Прошло ревью
CVSS4: 7.4

Описание

Neo4j Cypher MCP server is vulnerable to DNS rebinding

Impact

DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.

Patches

CORS Middleware added to Cypher MCP server v0.4.0 that blocks all web-based access by default.

Workarounds

If you cannot upgrade to v0.4.0 and above, use stdio mode.

References

Vendor Advisory https://www.cve.org/CVERecord?id=CVE-2025-10193

Credits We want to publicly recognize the contribution of Evan Harris from mcpsec.dev for reporting this issue and following the responsible disclosure policy.

Пакеты

Наименование

mcp-neo4j-cypher

pip
Затронутые версииВерсия исправления

>= 0.2.2, < 0.4.0

0.4.0

EPSS

Процентиль: 10%
0.00035
Низкий

7.4 High

CVSS4

Дефекты

CWE-346

Связанные уязвимости

nvd
5 месяцев назад

DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.

EPSS

Процентиль: 10%
0.00035
Низкий

7.4 High

CVSS4

Дефекты

CWE-346