Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-345p-7cg4-v4c7 | @modelcontextprotocol/sdk has cross-client data leak via shared server/transport instance reuse |
Wed, 18 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lfprojects
Lfprojects mcp Typescript Sdk |
|
| CPEs | cpe:2.3:a:lfprojects:mcp_typescript_sdk:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Lfprojects
Lfprojects mcp Typescript Sdk |
Thu, 05 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-367 | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 05 Feb 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Modelcontextprotocol
Modelcontextprotocol typescript-sdk |
|
| Vendors & Products |
Modelcontextprotocol
Modelcontextprotocol typescript-sdk |
Wed, 04 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MCP TypeScript SDK is the official TypeScript SDK for Model Context Protocol servers and clients. From version 1.10.0 to 1.25.3, cross-client response data leak when a single McpServer/Server and transport instance is reused across multiple client connections, most commonly in stateless StreamableHTTPServerTransport deployments. This issue has been patched in version 1.26.0. | |
| Title | @modelcontextprotocol/sdk has cross-client data leak via shared server/transport instance reuse | |
| Weaknesses | CWE-362 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-05T20:58:17.103Z
Reserved: 2026-02-02T19:59:47.374Z
Link: CVE-2026-25536
Updated: 2026-02-05T20:58:11.079Z
Status : Analyzed
Published: 2026-02-04T22:15:59.663
Modified: 2026-03-18T14:22:25.350
Link: CVE-2026-25536
OpenCVE Enrichment
Updated: 2026-04-17T23:15:30Z
Github GHSA