The MCP SSE endpoint in oatpp-mcp returns an instance pointer as the session ID, which is not unique nor cryptographically secure. This allows network attackers with access to the oatpp-mcp server to guess future session IDs and hijack legitimate client MCP sessions, returning malicious responses from the oatpp-mcp server.
Metrics
Affected Vendors & Products
References
History
Mon, 20 Oct 2025 20:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 20 Oct 2025 16:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The MCP SSE endpoint in oatpp-mcp returns an instance pointer as the session ID, which is not unique nor cryptographically secure. This allows network attackers with access to the oatpp-mcp server to guess future session IDs and hijack legitimate client MCP sessions, returning malicious responses from the oatpp-mcp server. | |
Title | Reuse of session IDs in oatpp-mcp leads to session hijacking and prompt hijacking by remote attackers | |
Weaknesses | CWE-330 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: JFROG
Published:
Updated: 2025-10-20T16:33:47.787Z
Reserved: 2025-06-23T10:56:07.978Z
Link: CVE-2025-6515

Updated: 2025-10-20T16:33:44.469Z

Status : Received
Published: 2025-10-20T17:15:39.197
Modified: 2025-10-20T17:15:39.197
Link: CVE-2025-6515

No data.

No data.