Skip to content

[SECURITY] Status of DNS Rebinding Vulnerability Fix for rust-sdk #815

@JLLeitschuh

Description

@JLLeitschuh

I found (and reported to Anthropic here) that all major MCP Server SDKs were vulnerable to browser-based DNS rebinding allowing malicious websites to talk to locally or private network connected MCP servers.

This is was in violation of the MCP specification : https://modelcontextprotocol.io/specification/2025-06-18/basic/transports#security-warning

This resulted in a slew of CVEs assigned to every major SDK:

It's not clear to me what version, if it was at all, of the rust-sdk this was fixed in, as no CVE was assigned. Would the project maintainers behind this project be so kind as to do create a GitHub Security Advisory and request a CVE including the fix version and credit myself?

Thanks team!

Metadata

Metadata

Assignees

No one assigned

    Labels

    P0Critical: blocking, security, data loss, or crashT-securitySecurity-related changes

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions