Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. mcp-neo4j-cypher
  4. ›
  5. CVE-2025-10193

CVE-2025-10193: Neo4j Cypher MCP server is vulnerable to DNS rebinding

September 11, 2025

DNS rebinding vulnerability in Neo4j Cypher MCP server allows malicious websites to bypass Same-Origin Policy protections and execute unauthorised tool invocations against locally running Neo4j MCP instances. The attack relies on the user being enticed to visit a malicious website and spend sufficient time there for DNS rebinding to succeed.

References

  • github.com/advisories/GHSA-vcqx-v2mg-7chx
  • github.com/neo4j-contrib/mcp-neo4j
  • github.com/neo4j-contrib/mcp-neo4j/commit/5b9fbdda6401668d7aa006daf7e644805c067c15
  • github.com/neo4j-contrib/mcp-neo4j/pull/165
  • github.com/neo4j-contrib/mcp-neo4j/releases/tag/mcp-neo4j-cypher-v0.4.0
  • github.com/neo4j-contrib/mcp-neo4j/security/advisories/GHSA-vcqx-v2mg-7chx
  • neo4j.com/security/cve-2025-10193
  • nvd.nist.gov/vuln/detail/CVE-2025-10193

Code Behaviors & Features

Detect and mitigate CVE-2025-10193 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.2.2 before 0.4.0

Fixed versions

  • 0.4.0

Solution

Upgrade to version 0.4.0 or above.

Weakness

  • CWE-346: Origin Validation Error

Source file

pypi/mcp-neo4j-cypher/CVE-2025-10193.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 18 Oct 2025 12:17:53 +0000.