DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.
History

Fri, 12 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Neo4j
Neo4j cypher Mcp Server
Neo4j neo4j
Vendors & Products Neo4j
Neo4j cypher Mcp Server
Neo4j neo4j

Thu, 11 Sep 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 11 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Description DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.
Title Neo4j Cypher MCP server is vulnerable to DNS rebinding attacks
Weaknesses CWE-346
References
Metrics cvssV4_0

{'score': 7.4, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/AU:N/V:D/RE:L/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Neo4j

Published:

Updated: 2025-09-12T03:56:13.888Z

Reserved: 2025-09-09T16:04:09.860Z

Link: CVE-2025-10193

cve-icon Vulnrichment

Updated: 2025-09-11T15:00:32.026Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-11T14:15:40.207

Modified: 2025-09-11T17:14:10.147

Link: CVE-2025-10193

cve-icon Redhat

No data.