Description
MCP Java SDK is the official Java SDK for Model Context Protocol servers and clients. Prior to versions 1.0.1 and 1.1.1, there is a hardcoded wildcard CORS vulnerability. This issue has been patched in versions 1.0.1 and 1.1.1.
Published: 2026-03-31
Score: 6.1 Medium
EPSS: n/a
KEV: No
Impact: Data leakage via permissive CORS
Action: Patch
AI Analysis

Impact

The MCP Java SDK contains a hardcoded wildcard CORS configuration that sets the Access‑Control‑Allow‑Origin header to an asterisk. This allows any external web page to issue cross‑origin requests to the SDK’s endpoints and receive responses that would normally be restricted by the same‑origin policy, effectively bypassing browser controls. The effect is that a malicious domain can read sensitive data or invoke actions exposed by the SDK, representing an access‑control weakness defined by CWE‑942.

Affected Systems

Model Context Protocol Java SDK versions released before 1.0.1 and 1.1.1 are affected. All deployments using these iterations must review their SDK version to ensure they are not vulnerable.

Risk and Exploitability

The baseline severity is scored at 6.1, indicating a moderate impact. No exploit probability metric is available, and the vulnerability is not listed in the CISA KEV catalog. The attack surface is any client that can reach the SDK’s HTTP endpoints, so an attacker could craft a malicious web page that performs cross‑origin requests to retrieve data or trigger actions. While no zero‑day proofs of concept are cited, the permissive CORS exposes data to any origin, warranting prompt remediation.

Generated by OpenCVE AI on March 31, 2026 at 17:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the MCP Java SDK to version 1.0.1 or newer
  • Verify that all servers and clients using the SDK are on the patched releases

Generated by OpenCVE AI on March 31, 2026 at 17:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-hv2w-8mjj-jw22 MCP Java SDK has a Hardcoded Wildcard CORS (Access-Control-Allow-Origin: *)
History

Tue, 31 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 31 Mar 2026 16:00:00 +0000

Type Values Removed Values Added
Description MCP Java SDK is the official Java SDK for Model Context Protocol servers and clients. Prior to versions 1.0.1 and 1.1.1, there is a hardcoded wildcard CORS vulnerability. This issue has been patched in versions 1.0.1 and 1.1.1.
Title MCP Java SDK has a Hardcoded Wildcard CORS (Access-Control-Allow-Origin: *)
Weaknesses CWE-942
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-31T18:52:38.217Z

Reserved: 2026-03-26T16:22:29.034Z

Link: CVE-2026-34237

cve-icon Vulnrichment

Updated: 2026-03-31T18:50:16.963Z

cve-icon NVD

Status : Received

Published: 2026-03-31T16:16:32.923

Modified: 2026-03-31T16:16:32.923

Link: CVE-2026-34237

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-31T19:54:06Z

Weaknesses