CVE-2025-10193: Neo4j Cypher MCP server is vulnerable to DNS rebinding
DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.
References
- github.com/advisories/GHSA-vcqx-v2mg-7chx
- github.com/neo4j-contrib/mcp-neo4j
- github.com/neo4j-contrib/mcp-neo4j/commit/5b9fbdda6401668d7aa006daf7e644805c067c15
- github.com/neo4j-contrib/mcp-neo4j/pull/165
- github.com/neo4j-contrib/mcp-neo4j/releases/tag/mcp-neo4j-cypher-v0.4.0
- github.com/neo4j-contrib/mcp-neo4j/security/advisories/GHSA-vcqx-v2mg-7chx
- neo4j.com/security/cve-2025-10193
- nvd.nist.gov/vuln/detail/CVE-2025-10193
Code Behaviors & Features
Detect and mitigate CVE-2025-10193 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →