icon

We found results for “

CVE-2025-10193

Good to know:

icon

Date: September 11, 2025

DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.

Severity Score

Severity Score

Weakness Type (CWE)

Origin Validation Error

CWE-346

Top Fix

icon

Upgrade Version

Upgrade to version mcp-neo4j-cypher - 0.4.0;https://github.com/neo4j-contrib/mcp-neo4j.git - mcp-neo4j-cypher-v0.4.0

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): NONE
User Interaction (UI): REQUIRED
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): NONE

Do you need more information?

Contact Us