CVE-2025-64443

N/A Unknown

📋 TL;DR

MCP Gateway versions 0.27.0 and earlier are vulnerable to DNS rebinding attacks when running in SSE or streaming transport mode. This allows attackers to exploit victims' browsers to manipulate MCP servers behind the gateway, potentially accessing tools and features exposed by those servers. Only deployments using network transport modes (not the default stdio mode) are affected.

💻 Affected Systems

Products:
  • MCP Gateway
Versions: 0.27.0 and earlier
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when running in SSE or streaming transport modes. Default stdio mode is not affected as it doesn't listen on network ports.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of MCP servers behind the gateway, allowing attackers to execute arbitrary commands, access sensitive data, or manipulate business logic through exposed MCP server tools.

🟠

Likely Case

Unauthorized access to MCP server functionality, potentially leading to data exposure, privilege escalation, or disruption of services that rely on MCP server outputs.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to MCP Gateway network endpoints.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

DNS rebinding attacks are well-known techniques that can be automated. Exploitation requires convincing victims to visit malicious websites or view malicious ads.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.28.0

Vendor Advisory: https://github.com/docker/mcp-gateway/security/advisories/GHSA-46gc-mwh4-cc5r

Restart Required: Yes

Instructions:

1. Update MCP Gateway to version 0.28.0 or later. 2. Restart the MCP Gateway service. 3. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Switch to stdio mode

all

Use the default stdio transport mode instead of SSE or streaming modes to avoid network exposure.

Configure MCP Gateway to use stdio transport mode in your deployment configuration

Network isolation

all

Restrict network access to MCP Gateway endpoints to trusted IP ranges only.

Use firewall rules to block external access to MCP Gateway ports
Implement network segmentation to isolate MCP Gateway from untrusted networks

🧯 If You Can't Patch

  • Switch MCP Gateway to stdio transport mode (default) which doesn't listen on network ports
  • Implement strict network access controls and firewall rules to prevent external access to MCP Gateway endpoints

🔍 How to Verify

Check if Vulnerable:

Check if MCP Gateway version is 0.27.0 or earlier AND is configured to use SSE or streaming transport modes.

Check Version:

Check the MCP Gateway version in your deployment configuration or run: mcp-gateway --version

Verify Fix Applied:

Verify MCP Gateway version is 0.28.0 or later, or confirm it's running in stdio mode.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DNS resolution patterns
  • Unauthorized access attempts to MCP Gateway endpoints
  • Suspicious MCP server tool invocations

Network Indicators:

  • DNS queries for unusual domains from MCP Gateway hosts
  • Unexpected HTTP/SSE connections to MCP Gateway ports
  • Cross-origin requests to MCP Gateway endpoints

SIEM Query:

source="mcp-gateway" AND (transport_mode="sse" OR transport_mode="streaming") AND version<="0.27.0"

🔗 References

📤 Share & Export