Impact
The MCP Java SDK hardcodes the HTTP header Access‑Control‑Allow‑Origin to an asterisk, permitting any web origin to issue cross‑origin requests and read responses. This CORS misconfiguration enables potential data leakage or cross‑site request forgery if the application exposes sensitive endpoints behind the SDK.
Affected Systems
The vulnerability affects the Model Context Protocol Java SDK for all releases prior to version 1.0.1 and 1.1.1. Clients and servers that integrate the SDK before these patch releases are susceptible; the patched versions introduce a non‑wildcard or configurable CORS policy.
Risk and Exploitability
With a CVSS score of 6.1 and an EPSS below 1 %, the risk is moderate and exploitation is unlikely but plausible. Attackers can exploit the flaw remotely by hosting a malicious web page, sending requests to the SDK’s endpoints, and reading the responses due to the permissive CORS header. The vulnerability is not listed in the CISA KEV catalog, indicating no known widespread exploitation currently.
OpenCVE Enrichment
Github GHSA