Project Subscriptions
No data.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-89vp-x53w-74fx | rmcp Streamable HTTP server transport has a DNS rebinding vulnerability |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 14 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 14 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RMCP is an official Rust SDK for the Model Context Protocol. Prior to version 1.4.0, the rmcp crate's Streamable HTTP server transport (crates/rmcp/src/transport/streamable_http_server/) did not validate the incoming Host header. This allowed a malicious public website, via a DNS rebinding attack, to send authenticated requests to an MCP server running on the victim's loopback or private-network interface. This vulnerability is fixed in 1.4.0. | |
| Title | RMCP: DNS rebinding vulnerability in rmcp Streamable HTTP server transport | |
| Weaknesses | CWE-346 CWE-350 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-14T16:00:33.149Z
Reserved: 2026-04-28T16:56:50.192Z
Link: CVE-2026-42559
Updated: 2026-05-14T16:00:29.092Z
Status : Deferred
Published: 2026-05-14T15:16:46.750
Modified: 2026-05-14T17:19:49.973
Link: CVE-2026-42559
No data.
OpenCVE Enrichment
Updated: 2026-05-14T16:30:24Z
Github GHSA