CVE-2025-56405
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-10

Last updated on: 2025-09-17

Assigner: MITRE

Description
An issue was discovered in litmusautomation litmus-mcp-server thru 0.0.1 allowing unauthorized attackers to control the target's MCP service through the SSE protocol.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-10
Last Modified
2025-09-17
Generated
2026-05-07
AI Q&A
2025-09-10
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
litmus mcp_server 0.0.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
CWE-284 The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-56405 is an unauthorized access vulnerability in the litmus-mcp-server's Server-Sent Events (SSE) endpoint. The server does not verify the identity of users connecting to the SSE endpoint, allowing any user to connect without authentication. Additionally, the server binds by default to the IP address 0.0.0.0, exposing the service to all network interfaces. This combination allows attackers to connect to the MCP service and control it without authorization. [1, 2]


How can this vulnerability impact me? :

This vulnerability allows unauthorized attackers to gain control over the litmus-mcp-server's MCP service remotely without any authentication or privileges. An attacker can connect to the server's SSE endpoint and manipulate the MCP, potentially leading to unauthorized control of multi-cloud platform operations. This can result in security breaches, data manipulation, or disruption of services. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to connect to the litmus-mcp-server SSE endpoint without authentication. For example, if the server is running with default settings (binding to 0.0.0.0 and port 8000), you can test unauthorized access by using tools like curl or the MCP tool to connect to the SSE endpoint and check if control over the MCP service is possible. A sample command to run the server for testing is: `docker run -d --name litmus-mcp-server -p 8000:8000 ghcr.io/litmusautomation/litmus-mcp-server:main`. Then, use a command like `curl http://<server-ip>:8000/sse-endpoint` (replace `/sse-endpoint` with the actual SSE path) to see if the connection is accepted without authentication. [1, 2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Deploy the litmus-mcp-server within a restricted network environment such as behind a VPN or internal network to limit access to trusted IP addresses. 2) Configure host or network firewalls to restrict inbound connections to port 8000 (default service port), allowing only authorized clients. 3) Avoid exposing the service directly to the public internet. 4) Monitor official vendor channels for patches or updates and apply them promptly once available. Long-term remediation involves implementing robust authentication and authorization mechanisms for the service. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart