CVE Details

CVE Details

CVEs associated with: "Critical Vulnerability in Oat++ MCP Implementation Could Lead to Session Hijacking"

Analyzed

CVSS Metrics

CVSS v3.1
High
HIGH

CVE-2025-6515

Artificial intelligence agents could have their Model Context Protocol sessions hijacked in attacks involving an Oat++ MCP implementation bug, tracked as CVE-2025-6515, The Register reports. Threat actors with relevant HTTP server access could exploit the vulnerability, which stems from how the oatpp-mcp's MCP SSE endpoint returns an instance pointer similar to the session ID, to facilitate accelerated session creation and destruction for the subsequent reassigning of IDs to legitimate client sessions, according to JFrog researchers. Breached IDs could then be harnessed for tool requests and command injections.

As AI models become increasingly embedded in workflows via protocols like MCP, they inherit new risks this session-level exploit shows how the model itself remains untouched while the ecosystem around it is compromised. Researchers recommend the usage of cryptographically secure random number generators in servers, as well as robust session separation and expiry mechanisms in transport channels, to mitigate such intrusions.

Published: 2025-10-22 20:27:29
Source: www.scworld.com

About CVE Data:

This information is sourced from the National Vulnerability Database (NVD) maintained by NIST. CVE data is cached for 24 hours to improve performance and reduce API load.

Learn more about CVEs at cve.mitre.org