The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-10193

CVE-2025-10193: Neo4j Cypher MCP Auth Bypass Vulnerability

CVE-2025-10193 is a DNS rebinding authentication bypass flaw in Neo4j Cypher MCP server that lets malicious sites execute unauthorized tool invocations. This article covers the technical details, affected systems, and mitigation.

Published: May 11, 2026

CVE-2025-10193 Overview

CVE-2025-10193 is a DNS rebinding vulnerability in the Neo4j Cypher Model Context Protocol (MCP) server. The flaw allows a malicious website to bypass Same-Origin Policy (SOP) protections in the user's browser and invoke unauthorised tools on a locally running Neo4j MCP instance. Exploitation requires a victim to visit attacker-controlled content and remain on the page long enough for the DNS rebinding sequence to complete. The vulnerability is categorised under CWE-346: Origin Validation Error.

Critical Impact

Successful exploitation enables attackers to issue Cypher queries and trigger MCP tool invocations against a locally bound Neo4j MCP server, exposing graph data and supporting unauthorised actions.

Affected Products

  • Neo4j Cypher MCP server (mcp-neo4j-cypher) prior to v0.4.0
  • Local developer and AI agent deployments exposing the MCP HTTP transport
  • Workstations running Neo4j MCP integrations alongside untrusted web browsing

Discovery Timeline

  • 2025-09-11 - CVE CVE-2025-10193 published to NVD
  • 2026-04-15 - Last updated in NVD database

Technical Details for CVE-2025-10193

Vulnerability Analysis

The Neo4j Cypher MCP server exposes an HTTP listener on the local loopback interface to serve tool invocations from MCP-aware clients. The server validates requests based on origin assumptions tied to localhost but does not verify the Host header or enforce strict origin pinning. A remote attacker can host a page that initially resolves a controlled domain to its own server, then rebinds that domain to 127.0.0.1 while the victim remains on the page. JavaScript executing under the attacker's origin can then issue requests that the browser treats as same-origin, reaching the MCP listener bound on the victim's host.

Root Cause

The root cause is insufficient origin validation in the MCP HTTP transport. The server trusts requests received on the loopback socket without confirming that the Host header, Origin header, or authentication token matches the expected local client. Because DNS rebinding allows attacker-controlled hostnames to point at loopback addresses, SOP no longer isolates the MCP service from cross-origin code.

Attack Vector

The attack proceeds in stages. The victim visits an attacker-controlled domain that returns a short DNS time-to-live. After initial page load, the attacker's authoritative server rebinds the hostname to 127.0.0.1. Scripts on the page then poll the original hostname, which now resolves to the local MCP server. The browser permits these requests as same-origin, and the script invokes MCP tools, runs Cypher queries against the bound Neo4j instance, and exfiltrates results back to the attacker. The high attack complexity reflects the timing and user-dwell requirements rather than technical depth.

No verified public exploit code is available. Refer to the GitHub Security Advisory GHSA-vcqx-v2mg-7chx for vendor-confirmed technical details.

Detection Methods for CVE-2025-10193

Indicators of Compromise

  • HTTP requests to the local MCP port (commonly bound on loopback) where the Host header contains an external domain rather than localhost or 127.0.0.1
  • Browser-originated requests to MCP tool endpoints correlated with active sessions on untrusted websites
  • Unexpected Cypher query patterns in Neo4j audit logs originating from MCP tool invocations during user web browsing windows

Detection Strategies

  • Inspect MCP server access logs for mismatches between the bound interface and the Host or Origin headers presented by clients.
  • Correlate browser process network telemetry with connections to MCP listener ports to identify cross-origin invocations.
  • Monitor DNS resolver telemetry for short-TTL responses that alternate between public IPs and RFC1918 or loopback ranges within a single session.

Monitoring Recommendations

  • Enable verbose request logging on mcp-neo4j-cypher and forward events to a centralised log platform for correlation with browser activity.
  • Track Neo4j query audit logs for tool invocations occurring outside expected developer workflows.
  • Alert on DNS responses that map external hostnames to loopback or private addresses, a hallmark of rebinding infrastructure.

How to Mitigate CVE-2025-10193

Immediate Actions Required

  • Upgrade mcp-neo4j-cypher to version 0.4.0 or later, which contains the vendor fix as documented in the v0.4.0 release notes.
  • Restart any MCP clients and agent runtimes that maintain persistent connections to the patched server.
  • Audit Neo4j query logs for unexpected Cypher invocations during periods when the vulnerable version was running.

Patch Information

Neo4j addressed CVE-2025-10193 in mcp-neo4j-cypher v0.4.0. Vendor details are available in the Neo4j CVE-2025-10193 advisory and the GitHub Security Advisory GHSA-vcqx-v2mg-7chx. The fix enforces Host header validation and origin checks on incoming MCP HTTP requests.

Workarounds

  • Run the MCP server only when actively in use and terminate the process when finished to shrink the exposure window.
  • Bind the MCP listener to a Unix domain socket or use stdio transport instead of HTTP where supported by the client.
  • Configure a local firewall rule to restrict the MCP port to trusted client processes only.
  • Use a browser profile separated from MCP development workstations to avoid co-resident browsing on attacker-controlled sites.
bash
# Configuration example: upgrade the vulnerable package
pip install --upgrade "mcp-neo4j-cypher>=0.4.0"

# Verify installed version
pip show mcp-neo4j-cypher | grep -i version

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechNeo4j

  • SeverityHIGH

  • CVSS Score7.4

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:D/RE:L/U:Amber
  • Impact Assessment
  • ConfidentialityHigh
  • IntegrityHigh
  • AvailabilityNone
  • CWE References
  • CWE-346
  • Technical References
  • GitHub Release mcp-neo4j-cypher v0.4.0

  • GitHub Security Advisory GHSA-vcqx-v2mg-7chx

  • Neo4j CVE-2025-10193 Information
  • Related CVEs
  • CVE-2026-35402: mcp-neo4j-cypher Auth Bypass Vulnerability

  • CVE-2026-1524: Neo4j Enterprise SSO Auth Bypass Flaw

  • CVE-2026-1497: Neo4j Enterprise Auth Bypass Vulnerability

  • CVE-2026-1471: Neo4j Enterprise Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English