Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Oatpp
Oatpp mcp |
|
| Vendors & Products |
Oatpp
Oatpp mcp |
Mon, 20 Oct 2025 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The MCP SSE endpoint in oatpp-mcp returns an instance pointer as the session ID, which is not unique nor cryptographically secure. This allows network attackers with access to the oatpp-mcp server to guess future session IDs and hijack legitimate client MCP sessions, returning malicious responses from the oatpp-mcp server. | |
| Title | Reuse of session IDs in oatpp-mcp leads to session hijacking and prompt hijacking by remote attackers | |
| Weaknesses | CWE-330 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-10-20T16:33:47.787Z
Reserved: 2025-06-23T10:56:07.978Z
Link: CVE-2025-6515
Updated: 2025-10-20T16:33:44.469Z
Status : Deferred
Published: 2025-10-20T17:15:39.197
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-6515
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:39:51Z