Skip to content

Commit 974f10c

Browse files

File tree

6 files changed

+327
-44
lines changed

6 files changed

+327
-44
lines changed

advisories/unreviewed/2025/11/GHSA-vghf-hv5q-vc2g/GHSA-vghf-hv5q-vc2g.json renamed to advisories/github-reviewed/2025/11/GHSA-vghf-hv5q-vc2g/GHSA-vghf-hv5q-vc2g.json

Lines changed: 33 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,12 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-vghf-hv5q-vc2g",
4-
"modified": "2025-11-27T06:31:25Z",
4+
"modified": "2025-12-02T16:51:42Z",
55
"published": "2025-11-27T06:31:25Z",
66
"aliases": [
77
"CVE-2025-12758"
88
],
9+
"summary": "Validator is Vulnerable to Incomplete Filtering of One or More Instances of Special Elements",
910
"details": "Versions of the package validator before 13.15.22 are vulnerable to Incomplete Filtering of One or More Instances of Special Elements in the isLength() function that does not take into account Unicode variation selectors (\\uFE0F, \\uFE0E) appearing in a sequence which lead to improper string length calculation. This can lead to an application using isLength for input validation accepting strings significantly longer than intended, resulting in issues like data truncation in databases, buffer overflows in other system components, or denial-of-service.",
1011
"severity": [
1112
{
@@ -17,7 +18,27 @@
1718
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X"
1819
}
1920
],
20-
"affected": [],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "npm",
25+
"name": "validator"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "0"
33+
},
34+
{
35+
"fixed": "13.15.22"
36+
}
37+
]
38+
}
39+
]
40+
}
41+
],
2142
"references": [
2243
{
2344
"type": "ADVISORY",
@@ -27,10 +48,18 @@
2748
"type": "WEB",
2849
"url": "https://github.com/validatorjs/validator.js/pull/2616"
2950
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/validatorjs/validator.js/commit/d457ecaf55b0f3d8bd379d82757425d0d13dd382"
54+
},
3055
{
3156
"type": "WEB",
3257
"url": "https://gist.github.com/koral--/ad31208b25b9e3d1e2e35f1d4d72572e"
3358
},
59+
{
60+
"type": "PACKAGE",
61+
"url": "https://github.com/validatorjs/validator.js"
62+
},
3463
{
3564
"type": "WEB",
3665
"url": "https://security.snyk.io/vuln/SNYK-JS-VALIDATOR-13653476"
@@ -41,8 +70,8 @@
4170
"CWE-792"
4271
],
4372
"severity": "HIGH",
44-
"github_reviewed": false,
45-
"github_reviewed_at": null,
73+
"github_reviewed": true,
74+
"github_reviewed_at": "2025-12-02T16:51:42Z",
4675
"nvd_published_at": "2025-11-27T05:16:12Z"
4776
}
4877
}
Lines changed: 62 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,62 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-9h52-p55h-vw2f",
4+
"modified": "2025-12-02T16:52:08Z",
5+
"published": "2025-12-02T16:52:08Z",
6+
"aliases": [
7+
"CVE-2025-66416"
8+
],
9+
"summary": "Model Context Protocol (MCP) Python SDK does not enable DNS rebinding protection by default",
10+
"details": "### Description\n\nThe Model Context Protocol (MCP) Python SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication using `FastMCP` with streamable HTTP or SSE transport, and has not configured `TransportSecuritySettings`, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances.\n\nNote that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport.\n\nServers created via `FastMCP()` now have DNS rebinding protection enabled by default when the `host` parameter is `127.0.0.1` or `localhost`. Users are advised to update to version `1.23.0` to receive this automatic protection. Users with custom low-level server configurations using `StreamableHTTPSessionManager` or `SseServerTransport` directly should explicitly configure `TransportSecuritySettings` when running an unauthenticated server on localhost.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "mcp"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.23.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/modelcontextprotocol/python-sdk/security/advisories/GHSA-9h52-p55h-vw2f"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/modelcontextprotocol/python-sdk/commit/d3a184119e4479ea6a63590bc41f01dc06e3fa99"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/modelcontextprotocol/python-sdk"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-1188",
55+
"CWE-350"
56+
],
57+
"severity": "HIGH",
58+
"github_reviewed": true,
59+
"github_reviewed_at": "2025-12-02T16:52:08Z",
60+
"nvd_published_at": null
61+
}
62+
}
Lines changed: 137 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,137 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-p6gj-jc38-x2m7",
4+
"modified": "2025-12-02T16:53:35Z",
5+
"published": "2025-12-01T21:30:26Z",
6+
"aliases": [
7+
"CVE-2025-12756"
8+
],
9+
"summary": "Mattermost fails to validate user permissions when deleting comments in Boards",
10+
"details": "Mattermost versions 11.0.x <= 11.0.2, 10.12.x <= 10.12.1, 10.11.x <= 10.11.4, 10.5.x <= 10.5.12 fail to validate user permissions when deleting comments in Boards, which allows an authenticated user with the editor role to delete comments created by other users.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/mattermost/mattermost/server/v8"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "8.0.0-20251013062617-7977e7e6dae3"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Go",
40+
"name": "github.com/mattermost/mattermost"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "10.11.0"
48+
},
49+
{
50+
"last_affected": "10.11.4"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Go",
59+
"name": "github.com/mattermost/mattermost"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "10.12.0"
67+
},
68+
{
69+
"last_affected": "10.12.1"
70+
}
71+
]
72+
}
73+
]
74+
},
75+
{
76+
"package": {
77+
"ecosystem": "Go",
78+
"name": "github.com/mattermost/mattermost"
79+
},
80+
"ranges": [
81+
{
82+
"type": "ECOSYSTEM",
83+
"events": [
84+
{
85+
"introduced": "10.5.0"
86+
},
87+
{
88+
"last_affected": "10.5.12"
89+
}
90+
]
91+
}
92+
]
93+
},
94+
{
95+
"package": {
96+
"ecosystem": "Go",
97+
"name": "github.com/mattermost/mattermost"
98+
},
99+
"ranges": [
100+
{
101+
"type": "ECOSYSTEM",
102+
"events": [
103+
{
104+
"introduced": "11.0.0"
105+
},
106+
{
107+
"last_affected": "11.0.2"
108+
}
109+
]
110+
}
111+
]
112+
}
113+
],
114+
"references": [
115+
{
116+
"type": "ADVISORY",
117+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12756"
118+
},
119+
{
120+
"type": "PACKAGE",
121+
"url": "https://github.com/mattermost/mattermost"
122+
},
123+
{
124+
"type": "WEB",
125+
"url": "https://mattermost.com/security-updates"
126+
}
127+
],
128+
"database_specific": {
129+
"cwe_ids": [
130+
"CWE-863"
131+
],
132+
"severity": "MODERATE",
133+
"github_reviewed": true,
134+
"github_reviewed_at": "2025-12-02T16:53:35Z",
135+
"nvd_published_at": "2025-12-01T20:15:49Z"
136+
}
137+
}
Lines changed: 66 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,66 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-w48q-cv73-mx4w",
4+
"modified": "2025-12-02T16:51:57Z",
5+
"published": "2025-12-02T16:51:57Z",
6+
"aliases": [
7+
"CVE-2025-66414"
8+
],
9+
"summary": "Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default",
10+
"details": "The Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with `StreamableHTTPServerTransport` or `SSEServerTransport` and has not enabled `enableDnsRebindingProtection`, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances.\n\nNote that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport.\n\nServers created via `createMcpExpressApp()` now have this protection enabled by default when binding to localhost. Users with custom Express configurations are advised to update to version `1.24.0` and apply the exported `hostHeaderValidation()` middleware when running an unauthenticated server on localhost.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V4",
14+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "@modelcontextprotocol/sdk"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.24.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "WEB",
41+
"url": "https://github.com/modelcontextprotocol/typescript-sdk/security/advisories/GHSA-w48q-cv73-mx4w"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/modelcontextprotocol/typescript-sdk/pull/1205"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/modelcontextprotocol/typescript-sdk/commit/608360047dc6899f1cf4f0226eb62fe7b11b3898"
50+
},
51+
{
52+
"type": "PACKAGE",
53+
"url": "https://github.com/modelcontextprotocol/typescript-sdk"
54+
}
55+
],
56+
"database_specific": {
57+
"cwe_ids": [
58+
"CWE-1188",
59+
"CWE-350"
60+
],
61+
"severity": "HIGH",
62+
"github_reviewed": true,
63+
"github_reviewed_at": "2025-12-02T16:51:57Z",
64+
"nvd_published_at": null
65+
}
66+
}

0 commit comments

Comments
 (0)