CVE-2026-42559 PUBLISHED

RMCP: DNS rebinding vulnerability in rmcp Streamable HTTP server transport

Assigner: GitHub_M
Reserved: 28.04.2026 Published: 14.05.2026 Updated: 14.05.2026

RMCP is an official Rust SDK for the Model Context Protocol. Prior to version 1.4.0, the rmcp crate's Streamable HTTP server transport (crates/rmcp/src/transport/streamable_http_server/) did not validate the incoming Host header. This allowed a malicious public website, via a DNS rebinding attack, to send authenticated requests to an MCP server running on the victim's loopback or private-network interface. This vulnerability is fixed in 1.4.0.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor modelcontextprotocol
Product rust-sdk
Versions
  • Version < 1.4.0 is affected

References

Problem Types

  • CWE-346: Origin Validation Error CWE
  • CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action CWE