Medium severity5.7NVD Advisory· Published Apr 7, 2026· Updated Apr 14, 2026
CVE-2026-35568
CVE-2026-35568
Description
MCP Java SDK is the official Java SDK for Model Context Protocol servers and clients. Prior to 1.0.0, the java-sdk contains a DNS rebinding vulnerability. This vulnerability allows an attacker to access a locally or network-private java-sdk MCP server via a victims browser that is either local, or network adjacent. This allows an attacker to make any tool call to the server as if they were a locally running MCP connected AI agent. This vulnerability is fixed in 1.0.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
io.modelcontextprotocol.sdk:mcp-coreMaven | < 1.0.0 | 1.0.0 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-8jxr-pr72-r468ghsaADVISORY
- github.com/modelcontextprotocol/java-sdk/security/advisories/GHSA-8jxr-pr72-r468nvdVendor AdvisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2026-35568ghsaADVISORY
- github.com/modelcontextprotocol/java-sdk/releases/tag/v1.0.0nvdRelease NotesWEB
News mentions
0No linked articles in our index yet.