chore(deps): update dependency @modelcontextprotocol/sdk to v1.24.0 [security]#135
chore(deps): update dependency @modelcontextprotocol/sdk to v1.24.0 [security]#135descope[bot] wants to merge 4 commits intomainfrom
Conversation
89dc3e3 to
b602f9e
Compare
b602f9e to
fc01943
Compare
Edited/Blocked NotificationRenovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR. You can manually request rebase by checking the rebase/retry box above. |
|
@shuni fix it |
|
🐕 Done! Updated PR: #135 📋 Actions TakenView AI responsePerfect! Let me create a summary of what was done: SummaryI've successfully fixed the security vulnerability by updating the Changes Made
Security Fix DetailsThe update addresses CVE-2025-66414 (CVSS Score: 7.6 / 10 - High severity):
Build Status✅ Build: Successful - Project compiles without errors Notes
The security vulnerability has been resolved, and the codebase is ready for the CI pipeline to handle the git operations. |
|
@shuni fix lint |
|
🐕 Uh oh! I ran into an error. Please check the logs for details. |
|
@shuni fix lint |
|
🐕 Uh oh! I ran into an error. Please check the logs for details. |
|
@shuni fix lint |
|
🐕 Uh oh! I ran into an error. Please check the logs for details. |
This PR contains the following updates:
1.15.1->1.24.0GitHub Vulnerability Alerts
CVE-2025-66414
The Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with
StreamableHTTPServerTransportorSSEServerTransportand has not enabledenableDnsRebindingProtection, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances.Note that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport.
Servers created via
createMcpExpressApp()now have this protection enabled by default when binding to localhost. Users with custom Express configurations are advised to update to version1.24.0and apply the exportedhostHeaderValidation()middleware when running an unauthenticated server on localhost.Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default
CVE-2025-66414 / GHSA-w48q-cv73-mx4w
More information
Details
The Model Context Protocol (MCP) TypeScript SDK does not enable DNS rebinding protection by default for HTTP-based servers. When an HTTP-based MCP server is run on localhost without authentication with
StreamableHTTPServerTransportorSSEServerTransportand has not enabledenableDnsRebindingProtection, a malicious website could exploit DNS rebinding to bypass same-origin policy restrictions and send requests to the local MCP server. This could allow an attacker to invoke tools or access resources exposed by the MCP server on behalf of the user in those limited circumstances.Note that running HTTP-based MCP servers locally without authentication is not recommended per MCP security best practices. This issue does not affect servers using stdio transport.
Servers created via
createMcpExpressApp()now have this protection enabled by default when binding to localhost. Users with custom Express configurations are advised to update to version1.24.0and apply the exportedhostHeaderValidation()middleware when running an unauthenticated server on localhost.Severity
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:NReferences
This data is provided by OSV and the GitHub Advisory Database (CC-BY 4.0).
Release Notes
modelcontextprotocol/typescript-sdk (@modelcontextprotocol/sdk)
v1.24.0Compare Source
Summary
This release brings us up to speed with the latest MCP spec
2025-11-25. Take a look at the latest spec as well as the release blog post.What's Changed
New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.23.0...1.24.0
v1.23.1Compare Source
Fixed:
This is a patch for servers still on 1.23.x that were breaking clients not handling the the
2025-11-25priming event behavior with empty SSEdatafields. See #1233 for more details.Full Changelog: modelcontextprotocol/typescript-sdk@1.23.0...1.23.1
v1.23.0Compare Source
What's Changed
.catchall()on inputSchema/outputSchema to support JSON Schema 2020-12 by @felixweinberger in #1135New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.22.0...1.23.0
v1.22.0Compare Source
What's Changed
registerTool: accept ZodType for input and output schema by @ksinder in #816New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.21.1...1.22.0
v1.21.2Compare Source
What's changed
This is a patch release for a regression highlighted by #1103
This patch contains only the cherry picked fix in #1108
Full Changelog: modelcontextprotocol/typescript-sdk@1.21.1...1.21.2
v1.21.1Compare Source
What's Changed
WWW-Authenticatescopeparam for SEP-835 by @chipgpt in #983New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.21.0...1.21.1
v1.21.0Compare Source
What's Changed
token_endpoint_auth_methodresponse from DCR registration by @chipgpt in #1022New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.20.2...1.21.0
v1.20.2Compare Source
What's Changed
New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.20.1...1.20.2
v1.20.1Compare Source
What's Changed
New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.20.0...1.20.1
v1.20.0Compare Source
What's Changed
New Contributors 🙏
Full Changelog: modelcontextprotocol/typescript-sdk@1.19.0...1.20.0
v1.19.1Compare Source
v1.18.2Compare Source
What's Changed
demoInMemoryOAuthProviderby @TylerLeonhardt in #931New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.18.1...1.18.2
v1.18.1Compare Source
What's Changed
New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.18.0...1.18.1
v1.18.0Compare Source
What's Changed
New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.17.5...1.18.0
v1.17.5Compare Source
What's Changed
Full Changelog: modelcontextprotocol/typescript-sdk@1.17.4...1.17.5
v1.17.4Compare Source
What's Changed
Full Changelog: modelcontextprotocol/typescript-sdk@1.17.3...1.17.4
v1.17.3Compare Source
What's Changed
New Contributors
Full Changelog: modelcontextprotocol/typescript-sdk@1.17.2...1.17.3
v1.17.2Compare Source
What's Changed
Full Changelog: modelcontextprotocol/typescript-sdk@1.17.1...1.17.2
v1.17.1Compare Source
What's Changed
Full Changelog: modelcontextprotocol/typescript-sdk@1.17.0...1.17.1
v1.17.0Compare Source
What's Changed
New Contributors 🙏
Full Changelog: modelcontextprotocol/typescript-sdk@1.16.0...1.17.0
v1.16.0Compare Source
What's Changed
invalidateCredentials()toOAuthClientProviderby @geelen in #570New Contributors 🙏
Full Changelog: modelcontextprotocol/typescript-sdk@1.15.1...1.16.0
Configuration
📅 Schedule: Branch creation - "" in timezone Asia/Jerusalem, Automerge - At any time (no schedule defined).
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Renovate Bot.