We found results for “”
CVE-2025-10193
Good to know:
Date: September 11, 2025
DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.
Severity Score
Related Resources (8)
Severity Score
Weakness Type (CWE)
Origin Validation Error
CWE-346Top Fix
Upgrade Version
Upgrade to version mcp-neo4j-cypher - 0.4.0;https://github.com/neo4j-contrib/mcp-neo4j.git - mcp-neo4j-cypher-v0.4.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | HIGH |
| Privileges Required (PR): | NONE |
| User Interaction (UI): | REQUIRED |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


