mcp is vulnerable to Cross-site Scripting (XSS)
42
Medium Risk
Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via JSON-RPC Request ID Reflection due to missing validation on string-based request IDs in the underlying json_rpc_handler dependency; this vulnerability occurs because user-supplied input within the id field is directly reflected in HTTP responses, allowing an attacker to craft malicious requests containing HTML or JavaScript payloads in the ID, which are then executed in a victim's browser if the response is rendered without proper output encoding or Content-Type hardening.
You are affected if you are using a version that falls within the vulnerable range.
mcp is vulnerable to Cross-site Scripting (XSS) in versions 0.1.0 - 0.4.0.
Upgrade the mcp library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant