Skip to content

Fix CVE-2025-66414: Update @modelcontextprotocol/sdk to patch DNS rebinding vulnerability#5

Draft
Copilot wants to merge 2 commits intomainfrom
copilot/fix-dns-rebinding-protection
Draft

Fix CVE-2025-66414: Update @modelcontextprotocol/sdk to patch DNS rebinding vulnerability#5
Copilot wants to merge 2 commits intomainfrom
copilot/fix-dns-rebinding-protection

Conversation

Copy link
Copy Markdown

Copilot AI commented Mar 2, 2026

@modelcontextprotocol/sdk < 1.24.0 does not enable DNS rebinding protection by default, allowing malicious sites to bypass same-origin policy and reach local MCP HTTP servers (e.g. SSEServerTransport, StreamableHTTPServerTransport) to invoke tools or access local resources.

Changes

  • package.json: Bumps @modelcontextprotocol/sdk from ^1.0.1^1.27.1 (minimum safe version is 1.24.0)
  • package-lock.json: Updated lockfile reflecting the new resolved dependency tree

🔒 GitHub Advanced Security automatically protects Copilot coding agent pull requests. You can protect all pull requests by enabling Advanced Security for your repositories. Learn more about Advanced Security.

…S rebinding protection

Co-authored-by: sfosss <147890625+sfosss@users.noreply.github.com>
Copilot AI changed the title [WIP] Fix DNS rebinding protection in MCP TypeScript SDK Fix CVE-2025-66414: Update @modelcontextprotocol/sdk to patch DNS rebinding vulnerability Mar 2, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants