No analysis available yet.
Vendor Solution
This issue is fixed in v0.4.0 and all later versions.
Vendor Workaround
Use stdio mode if you cannot upgrade to v0.4.0 and above.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-28908 | DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed. |
Github GHSA |
GHSA-vcqx-v2mg-7chx | Neo4j Cypher MCP server is vulnerable to DNS rebinding |
Fri, 12 Sep 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Neo4j
Neo4j cypher Mcp Server Neo4j neo4j |
|
| Vendors & Products |
Neo4j
Neo4j cypher Mcp Server Neo4j neo4j |
Thu, 11 Sep 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 11 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed. | |
| Title | Neo4j Cypher MCP server is vulnerable to DNS rebinding attacks | |
| Weaknesses | CWE-346 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Neo4j
Published:
Updated: 2026-02-26T17:48:41.293Z
Reserved: 2025-09-09T16:04:09.860Z
Link: CVE-2025-10193
Updated: 2025-09-11T15:00:32.026Z
Status : Awaiting Analysis
Published: 2025-09-11T14:15:40.207
Modified: 2025-09-11T17:14:10.147
Link: CVE-2025-10193
No data.
OpenCVE Enrichment
Updated: 2025-09-12T09:11:17Z
EUVD
Github GHSA