Home

Description

DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.

PUBLISHED Reserved 2025-09-09 | Published 2025-09-11 | Updated 2025-09-12 | Assigner Neo4j




HIGH: 7.4CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/V:D/RE:L/U:Amber

Problem types

CWE-346 Origin Validation Error

Product status

Default status
unaffected

0.2.2 (semver)
affected

Credits

Evan Harris finder

References

neo4j.com/security/cve-2025-10193 vendor-advisory

github.com/...-neo4j/security/advisories/GHSA-vcqx-v2mg-7chx third-party-advisory

github.com/...mcp-neo4j/releases/tag/mcp-neo4j-cypher-v0.4.0 release-notes

cve.org (CVE-2025-10193)

nvd.nist.gov (CVE-2025-10193)

Download JSON