CVE-2025-59163

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-59163
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-59163.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-59163
Aliases
Downstream
Related
Published
2025-09-29T21:51:31Z
Modified
2025-10-30T20:35:28.603145Z
Severity
  • 2.1 (Low) CVSS_V4 - CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS Calculator
Summary
vet MCP Server SSE Transport DNS Rebinding Vulnerability
Details

vet is an open source software supply chain security tool. Versions 1.12.4 and below are vulnerable to a DNS rebinding attack due to lack of HTTP Host and Origin header validation. Data from the vet scan sqlite3 database may be exposed to remote attackers when vet is used as an MCP server in SSE mode with default ports through the sqlite3 query MCP tool. This issue is fixed in version 1.12.5.

Database specific
{
    "cwe_ids": [
        "CWE-350"
    ]
}
References

Affected packages

Git / github.com/safedep/vet

Affected ranges

Type
GIT
Repo
https://github.com/safedep/vet
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.0.1-dev
v0.0.2-dev
v0.0.4-dev
v0.0.5-dev
v0.0.6-dev
v0.0.7-dev
v0.0.8

v1.*

v1.0.0
v1.0.0-rc1
v1.0.0-rc2
v1.1.0
v1.10.0
v1.10.1
v1.10.2
v1.10.3
v1.10.4
v1.11.0
v1.11.1
v1.11.2
v1.11.3
v1.12.0
v1.12.1
v1.12.2
v1.12.3
v1.12.4
v1.2.0
v1.3.0
v1.3.0-rc1
v1.3.1
v1.4.0
v1.5.0
v1.5.1
v1.5.10
v1.5.11
v1.5.2
v1.5.3
v1.5.4
v1.5.5
v1.5.6
v1.5.7
v1.5.8
v1.5.9
v1.6.0
v1.6.1
v1.7.0
v1.8.0
v1.8.1
v1.8.10
v1.8.11
v1.8.2
v1.8.3
v1.8.4
v1.8.5
v1.8.6
v1.8.7
v1.8.8
v1.8.9
v1.9.0
v1.9.1
v1.9.2
v1.9.3
v1.9.4
v1.9.5
v1.9.6
v1.9.7
v1.9.8
v1.9.9