CVE-2026-42559: RMCP Rust SDK Vulnerable to DNS Rebinding
The National Vulnerability Database has issued an advisory for CVE-2026-42559, affecting the RMCP Rust SDK. Specifically, the rmcp crate’s Streamable HTTP server transport, found in crates/rmcp/src/transport/streamable_http_server/, did not validate the incoming Host header prior to version 1.4.0. This critical flaw opens the door for DNS rebinding attacks.
Attackers can leverage this vulnerability by hosting a malicious public website. When a victim browses this site, it can send authenticated requests to an MCP server running on the victim’s loopback or private-network interface. The lack of Host header validation means the server trustingly processes these requests, effectively bypassing same-origin policies and network segmentation. This is a severe bypass, rated 8.8 (HIGH) on the CVSS scale.
The fix is available in version 1.4.0 of the rmcp crate. Organizations utilizing the RMCP Rust SDK must prioritize this update. Ignoring Host header validation is a fundamental security misstep that attackers consistently exploit to pivot from client-side compromises to internal network access. This isn’t theoretical; it’s a proven attack vector that puts internal services at risk.
What This Means For You
- If your organization develops or uses applications built with the RMCP Rust SDK, specifically the `rmcp` crate, you are directly exposed to DNS rebinding attacks. Check your dependencies immediately and ensure all instances are updated to version 1.4.0 or newer to mitigate CVE-2026-42559. This isn't a future problem; attackers are already chaining browser-based exploits with internal network access vulnerabilities like this.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-42559: RMCP Rust SDK Host Header DNS Rebinding Attempt
title: CVE-2026-42559: RMCP Rust SDK Host Header DNS Rebinding Attempt
id: scw-2026-05-14-ai-1
status: experimental
level: high
description: |
Detects potential DNS rebinding attacks targeting the RMCP Rust SDK. This rule looks for HTTP POST requests to '/rmcp' endpoints, originating from a public website (indicated by the referer header), and directed towards localhost (127.0.0.1). This behavior is specific to CVE-2026-42559 where the SDK did not validate the Host header, allowing external sites to bind to internal services.
author: SCW Feed Engine (AI-generated)
date: 2026-05-14
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-42559/
tags:
- attack.initial_access
- attack.t1189
logsource:
category: webserver
detection:
selection:
cs-uri.keyword: '*'
referer|contains:
- 'http://'
cs-method: 'POST'
cs-uri-query|contains:
- '/rmcp'
dst_ip: '127.0.0.1'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42559 | Auth Bypass | rmcp crate's Streamable HTTP server transport (crates/rmcp/src/transport/streamable_http_server/) in RMCP prior to version 1.4.0 |
| CVE-2026-42559 | Misconfiguration | Lack of Host header validation in RMCP Streamable HTTP server transport |
| CVE-2026-42559 | Auth Bypass | DNS rebinding attack against RMCP server |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 14, 2026 at 18:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.