CVE-2026-25536

7.1 HIGH

📋 TL;DR

The CVE-2026-25536 vulnerability in the MCP TypeScript SDK allows cross-client response data leakage when a single server/transport instance is reused across multiple client connections. This affects deployments using stateless StreamableHTTPServerTransport, potentially exposing sensitive data between clients. Organizations using MCP TypeScript SDK versions 1.10.0 through 1.25.3 in multi-client environments are impacted.

💻 Affected Systems

Products:
  • MCP TypeScript SDK
Versions: 1.10.0 to 1.25.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability manifests specifically when McpServer/Server and transport instances are reused across multiple client connections, particularly in stateless StreamableHTTPServerTransport deployments.

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive client data (authentication tokens, private messages, proprietary information) is exposed to unauthorized clients, leading to data breaches, privilege escalation, and compliance violations.

🟠

Likely Case

Accidental data leakage between clients sharing the same server instance, potentially exposing session data, configuration details, or partial application state.

🟢

If Mitigated

Minimal impact with proper isolation between client connections or when using single-client deployments.

🌐 Internet-Facing: HIGH - Stateless HTTP server deployments are commonly internet-facing, making them accessible to attackers who could intercept or manipulate client data.
🏢 Internal Only: MEDIUM - Internal deployments still risk data leakage between legitimate clients, but attack surface is reduced compared to internet-facing systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires access to the vulnerable server but doesn't require authentication. Attack complexity is low as it leverages improper session/data isolation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.26.0

Vendor Advisory: https://github.com/modelcontextprotocol/typescript-sdk/security/advisories/GHSA-345p-7cg4-v4c7

Restart Required: Yes

Instructions:

1. Update MCP TypeScript SDK to version 1.26.0 or later using npm update @modelcontextprotocol/sdk. 2. Restart all affected services. 3. Verify no regressions in client-server communication.

🔧 Temporary Workarounds

Implement client isolation

all

Create separate server instances for each client connection instead of reusing instances

Use stateful transports

all

Avoid stateless StreamableHTTPServerTransport in multi-client deployments

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable servers from untrusted networks
  • Deploy application-level monitoring to detect unusual cross-client data access patterns

🔍 How to Verify

Check if Vulnerable:

Check package.json for @modelcontextprotocol/sdk version between 1.10.0 and 1.25.3, and verify if server instances are reused across client connections.

Check Version:

npm list @modelcontextprotocol/sdk

Verify Fix Applied:

Confirm @modelcontextprotocol/sdk version is 1.26.0 or higher in package.json and test that client data remains isolated during concurrent connections.

📡 Detection & Monitoring

Log Indicators:

  • Multiple client sessions sharing server instance IDs
  • Unexpected data appearing in client responses
  • Cross-client request/response patterns

Network Indicators:

  • Multiple clients receiving identical or overlapping response data
  • Unusual data patterns in HTTP responses

SIEM Query:

source="application_logs" AND ("cross-client" OR "data leak" OR "session overlap")

🔗 References

📤 Share & Export