Impact
The Model Context Protocol Go SDK omits DNS rebinding protection for HTTP‑based servers before version 1.4.0. When an MCP server runs on localhost without authentication, a malicious site can perform DNS rebinding to circumvent same‑origin policy and issue arbitrary requests to the local server. This exposure may let an attacker invoke backend tools or retrieve data exposed by the MCP server, effectively enabling remote code execution or unauthorized data access. The weakness is identified as CWE‑1188.
Affected Systems
Affected are developers using the Model Context Protocol Go SDK. Any deployment of the SDK older than version 1.4.0 that exposes an HTTP server over localhost and does not employ authentication is vulnerable. The patch that disables the default vulnerability was introduced in release v1.4.0.
Risk and Exploitability
The CVSS score of 7.6 signals a high severity, and while the EPSS is not available, the lack of KEV listing suggests that market damage is not yet observed. Attackers can exploit this flaw by hosting a malicious webpage that triggers DNS rebinding, especially if the victim’s browser has an active session with the local MCP server. Because the server is assumed to be on localhost and unauthenticated, the attack typically requires the victim’s browser to be tricked into making the rebinding request.
OpenCVE Enrichment
Github GHSA