Intel

AIKIDO-2026-10043

mcp is vulnerable to Cross-site Scripting (XSS)

Cross-site Scripting (XSS) Pre-CVE
Found by Aikido Intel before public disclosure or CVE publication.

42

Medium Risk

This Affects:

RUBYmcp
0.1.0 - 0.4.0
Fixed in 0.5.0

TL;DR

Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via JSON-RPC Request ID Reflection due to missing validation on string-based request IDs in the underlying json_rpc_handler dependency; this vulnerability occurs because user-supplied input within the id field is directly reflected in HTTP responses, allowing an attacker to craft malicious requests containing HTML or JavaScript payloads in the ID, which are then executed in a victim's browser if the response is rendered without proper output encoding or Content-Type hardening.

Who does this affect?

You are affected if you are using a version that falls within the vulnerable range.

Background info

mcp is vulnerable to Cross-site Scripting (XSS) in versions 0.1.0 - 0.4.0.

How to fix this

Upgrade the mcp library to the patch version.