CVE-2025-59163: vet MCP Server SSE Transport DNS Rebinding Vulnerability
(updated )
SafeDep vet is vulnerable to a DNS rebinding attack due to lack of HTTP Host and Origin header validation.
To exploit this vulnerability following conditions must be met:
- A
vetscan is executed and reports are saved assqlite3database - A
vetMCP server is running on default port with SSE transport that has access to the report database - The attacker lures the victim to attacker controlled website
- Attacker leverages DNS rebinding to access
vetSSE server on127.0.0.1through the website - Attacker uses MCP tools to read information from report database
References
- github.com/advisories/GHSA-6q9c-m9fr-865m
- github.com/safedep/vet
- github.com/safedep/vet/commit/0ae3560ba11846375812377299fe078d45cc3d48
- github.com/safedep/vet/releases/tag/v1.12.5
- github.com/safedep/vet/security/advisories/GHSA-6q9c-m9fr-865m
- nvd.nist.gov/vuln/detail/CVE-2025-59163
- pkg.go.dev/vuln/GO-2025-3986
Code Behaviors & Features
Detect and mitigate CVE-2025-59163 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →