Neo4j Cypher MCP server is vulnerable to DNS rebinding
        
  High severity
        
          GitHub Reviewed
      
        Published
          Sep 11, 2025 
          in
          
            neo4j-contrib/mcp-neo4j
          
          •
          Updated Sep 11, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Sep 11, 2025 
    
  
        Published to the GitHub Advisory Database
      Sep 11, 2025 
    
  
        Reviewed
      Sep 11, 2025 
    
  
        Last updated
      Sep 11, 2025 
    
  
Impact
DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.
Patches
CORS Middleware added to Cypher MCP server v0.4.0 that blocks all web-based access by default.
Workarounds
If you cannot upgrade to v0.4.0 and above, use stdio mode.
References
Vendor Advisory
https://www.cve.org/CVERecord?id=CVE-2025-10193
Credits
We want to publicly recognize the contribution of Evan Harris from mcpsec.dev for reporting this issue and following the responsible disclosure policy.
References