Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Sep 1, 2025

Note: This PR body was truncated due to platform limits.

This PR contains the following updates:

Package Change Age Confidence
mcp 1.9.1 -> 1.23.0 age confidence

MCP Python SDK vulnerability in the FastMCP Server causes validation error, leading to DoS

CVE-2025-53366 / GHSA-3qhf-m339-9g5v

More information

Details

A validation error in the MCP SDK can cause an unhandled exception when processing malformed requests, resulting in service unavailability (500 errors) until manually restarted. Impact may vary depending on the deployment conditions, and presence of infrastructure-level resilience measures.

Thank you to Rich Harang for reporting this issue.

Severity

  • CVSS Score: 8.7 / 10 (High)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


MCP Python SDK has Unhandled Exception in Streamable HTTP Transport, Leading to Denial of Service

CVE-2025-53365 / GHSA-j975-95f5-7wqh

More information

Details

If a client deliberately triggers an exception after establishing a streamable HTTP session, this can lead to an uncaught ClosedResourceError on the server side, causing the server to crash and requiring a restart to restore service. Impact may vary depending on the deployment conditions, and presence of infrastructure-level resilience measures.

Thank you to Rich Harang for reporting this issue.

Severity

  • CVSS Score: 8.7 / 10 (High)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Model Context Protocol (MCP) Python SDK does not enable DNS rebinding protection by default

CVE-2025-66416 / GHSA-9h52-p55h-vw2f

More information

Details

Description

The Model Context Protocol (MCP) Python SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication using FastMCP with streamable HTTP or SSE transport, and has not configured TransportSecuritySettings, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances.

Note that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport.

Servers created via FastMCP() now have DNS rebinding protection enabled by default when the host parameter is 127.0.0.1 or localhost. Users are advised to update to version 1.23.0 to receive this automatic protection. Users with custom low-level server configurations using StreamableHTTPSessionManager or SseServerTransport directly should explicitly configure TransportSecuritySettings when running an unauthenticated server on localhost.

Severity

  • CVSS Score: 7.6 / 10 (High)
  • Vector String: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

References

This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).


Release Notes

modelcontextprotocol/python-sdk (mcp)

v1.23.0

Compare Source

Summary

This release brings us up to speed with the latest MCP spec 2025-11-25. Take a look at the latest spec as well as the release blog post.

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.22.0...v1.23.0

v1.22.0

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.21.1...v1.22.0

v1.21.2

Compare Source

Hotfix Release

This is a hotfix release to address a critical bug in OAuth scope handling that caused failures on 401 responses.

Related:

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.21.1...v1.21.2

v1.21.1

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.21.0...v1.21.1

v1.21.0

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.20.0...v1.21.0

v1.20.0

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.19.0...v1.20.0

v1.19.0

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.18.0...v1.19.0

v1.18.0

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.17.0...v1.18.0

v1.17.0

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.16.0...v1.17.0

v1.16.0

Compare Source

What's Changed

New Contributors 🙏

Full Changelog: modelcontextprotocol/python-sdk@1.15.0...v1.16.0

v1.15.0

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.14.1...v1.15.0

v1.14.1

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.14.0...v1.14.1

v1.14.0

Compare Source

What's Changed

New Contributors 🙏

Full Changelog: modelcontextprotocol/python-sdk@v1.13.1...v1.14.0

v1.13.1

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.13.0...v1.13.1

v1.13.0

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.12.4...v1.13.0

v1.12.4

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.12.3...v1.12.4

v1.12.3

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.12.2...v1.12.3

v1.12.2

Compare Source

What's Changed

Full Changelog: modelcontextprotocol/python-sdk@v1.12.1...v1.13.0

v1.12.1

Compare Source

What's Changed

New Contributors

Full Changelog: modelcontextprotocol/python-sdk@v1.12.0...v1.12.1

v1.12.0

Compare Source

What's Changed

New Contributors 🙏

Full Changelog: modelcontextprotocol/python-sdk@v1.11.0...v1.12.0

v1.11.0

Compare Source

What's Changed


Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@socket-security
Copy link

Review the following changes in direct dependencies. Learn more about Socket for GitHub.

Diff Package Supply Chain
Security
Vulnerability Quality Maintenance License
Addedpywin32@​3117410010010070
Updatedmcp@​1.9.1 ⏵ 1.13.199100100100100
Addedattrs@​25.3.0100100100100100
Addedrpds-py@​0.27.1100100100100100

View full report

@socket-security
Copy link

Caution

Review the following alerts detected in dependencies.

According to your organization's Security Policy, you must resolve all "Block" alerts before proceeding. Learn more about Socket for GitHub.

Action Severity Alert  (click "▶" to expand/collapse)
Block Medium
pywin32@311 has Native code.

Location: Package overview

From: uv.lockpypi/pywin32@311

ℹ Read more on: This package | This alert | Why is native code a concern?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Verify that the inclusion of native code is expected and necessary for this package's functionality. If it is unnecessary or unexpected, consider using alternative packages without native code to mitigate potential risks.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/pywin32@311. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

Block Medium
[email protected] has Native code.

Location: Package overview

From: ?pypi/[email protected]

ℹ Read more on: This package | This alert | Why is native code a concern?

Next steps: Take a moment to review the security alert above. Review the linked package source code to understand the potential risk. Ensure the package is not malicious before proceeding. If you're unsure how to proceed, reach out to your security team or ask the Socket team for help at [email protected].

Suggestion: Verify that the inclusion of native code is expected and necessary for this package's functionality. If it is unnecessary or unexpected, consider using alternative packages without native code to mitigate potential risks.

Mark the package as acceptable risk. To ignore this alert only in this pull request, reply with the comment @SocketSecurity ignore pypi/[email protected]. You can also ignore all packages with @SocketSecurity ignore-all. To ignore an alert for all future pull requests, use Socket's Dashboard to change the triage state of this alert.

View full report

@renovate renovate bot changed the title fix(deps): update dependency mcp to v1.10.0 [security] chore(deps): update dependency mcp to v1.10.0 [security] Sep 26, 2025
@renovate renovate bot force-pushed the renovate/pypi-mcp-vulnerability branch from 2e7e1eb to 325adb7 Compare October 25, 2025 19:47
@renovate renovate bot force-pushed the renovate/pypi-mcp-vulnerability branch 2 times, most recently from cd7d2f9 to 32ff8a8 Compare November 19, 2025 07:14
@renovate renovate bot force-pushed the renovate/pypi-mcp-vulnerability branch from 32ff8a8 to 290ab6f Compare November 26, 2025 00:09
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
@renovate renovate bot changed the title chore(deps): update dependency mcp to v1.10.0 [security] chore(deps): update dependency mcp to v1.23.0 [security] Dec 3, 2025
@renovate renovate bot force-pushed the renovate/pypi-mcp-vulnerability branch from 290ab6f to 5641911 Compare December 3, 2025 12:04
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant