DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.
Fixes

Solution

This issue is fixed in v0.4.0 and all later versions.


Workaround

Use stdio mode if you cannot upgrade to v0.4.0 and above.

History

Thu, 11 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Description DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.
Title Neo4j Cypher MCP server is vulnerable to DNS rebinding attacks
Weaknesses CWE-346
References
Metrics cvssV4_0

{'score': 7.4, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/V:D/RE:L/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Neo4j

Published:

Updated: 2025-09-11T15:00:35.064Z

Reserved: 2025-09-09T16:04:09.860Z

Link: CVE-2025-10193

cve-icon Vulnrichment

Updated: 2025-09-11T15:00:32.026Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-11T14:15:40.207

Modified: 2025-09-11T17:14:10.147

Link: CVE-2025-10193

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.