Origin Validation Error Affecting mcp-neo4j-cypher package, versions [0.2.2,0.4.0)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-MCPNEO4JCYPHER-12671192
  • published15 Sept 2025
  • disclosed11 Sept 2025
  • creditEvan Harris

Introduced: 11 Sep 2025

NewCVE-2025-10193  (opens in a new tab)
CWE-346  (opens in a new tab)

How to fix?

Upgrade mcp-neo4j-cypher to version 0.4.0 or higher.

Overview

mcp-neo4j-cypher is an A simple Neo4j MCP server

Affected versions of this package are vulnerable to Origin Validation Error via the lack of proper origin validation in the server's request handling. An attacker can execute unauthorized tool invocations against locally running instances by enticing a user to visit a malicious website and remain there long enough for DNS rebinding to occur.

Workaround

This vulnerability can be mitigated by using stdio mode.

CVSS Base Scores

version 4.0
version 3.1