Cyber Posture

CVE-2026-0621

HighPublic PoC

Published: 05 January 2026

Published
05 January 2026
Modified
30 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0005 14.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-0621 is a high-severity Inefficient Regular Expression Complexity (CWE-1333) vulnerability in Lfprojects Mcp Typescript Sdk. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 14.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

This vulnerability is AI-related — categorised as APIs and Models; in the Protocol-Specific Risks risk domain.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

ReDoS vulnerability directly enables application-layer DoS via crafted input triggering catastrophic backtracking and resource exhaustion.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Anthropic's MCP TypeScript SDK versions up to and including 1.25.1 contain a regular expression denial of service (ReDoS) vulnerability in the UriTemplate class when processing RFC 6570 exploded array patterns. The dynamically generated regular expression used during URI matching contains…

more

nested quantifiers that can trigger catastrophic backtracking on specially crafted inputs, resulting in excessive CPU consumption. An attacker can exploit this by supplying a malicious URI that causes the Node.js process to become unresponsive, leading to a denial of service.

Deeper analysisAI

CVE-2026-0621 is a regular expression denial of service (ReDoS) vulnerability affecting Anthropic's MCP TypeScript SDK in versions up to and including 1.25.1. The issue resides in the UriTemplate class during processing of RFC 6570 exploded array patterns, where a dynamically generated regular expression for URI matching includes nested quantifiers. These can trigger catastrophic backtracking on specially crafted inputs, leading to excessive CPU consumption and potential unresponsiveness of the Node.js process.

The vulnerability has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating network accessibility with low attack complexity, no privileges or user interaction required. Any remote attacker can exploit it by supplying a malicious URI to a vulnerable application using the SDK, causing the Node.js process to become unresponsive and resulting in a denial of service. It is associated with CWE-1333 (Inefficient Regular Expression Complexity).

Advisories detail the issue in GitHub issue #965 at https://github.com/modelcontextprotocol/typescript-sdk/issues/965 and the VulnCheck advisory at https://www.vulncheck.com/advisories/mcp-typescript-sdk-uritemplate-exploded-array-pattern-redos. Practitioners should consult these for mitigation guidance, such as updating to a patched SDK version beyond 1.25.1.

Details

CWE(s)

Affected Products

lfprojects
mcp typescript sdk
≤ 1.25.1

AI Security AnalysisAI

AI Category
APIs and Models
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: mcp

CVEs Like This One

CVE-2026-25536Same product: Lfprojects Mcp Typescript Sdk
CVE-2026-27623Same vendor: Lfprojects
CVE-2024-12720Shared CWE-1333
CVE-2025-70030Shared CWE-1333
CVE-2026-0545Same vendor: Lfprojects
CVE-2026-28356Shared CWE-1333
CVE-2026-22178Shared CWE-1333
CVE-2026-1388Shared CWE-1333
CVE-2026-23897Shared CWE-1333
CVE-2024-58340Shared CWE-1333

References