The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Model Context Protocol (MCP). Prior to version 1.10.0, if a client deliberately triggers an exception after establishing a streamable HTTP session, this can lead to an uncaught ClosedResourceError on the server side, causing the server to crash and requiring a restart to restore service. Impact may vary depending on the deployment conditions, and presence of infrastructure-level resilience measures. Version 1.10.0 contains a patch for the issue.
                
            Metrics
Affected Vendors & Products
References
        History
                    Tue, 08 Jul 2025 14:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        ssvc
         
  | 
Mon, 07 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
         | |
| Metrics | 
        
        
        threat_severity
         
  | 
    
        
        cvssV3_1
         
 
  | 
Fri, 04 Jul 2025 22:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Model Context Protocol (MCP). Prior to version 1.10.0, if a client deliberately triggers an exception after establishing a streamable HTTP session, this can lead to an uncaught ClosedResourceError on the server side, causing the server to crash and requiring a restart to restore service. Impact may vary depending on the deployment conditions, and presence of infrastructure-level resilience measures. Version 1.10.0 contains a patch for the issue. | |
| Title | MCP Python SDK has Unhandled Exception in Streamable HTTP Transport ,Leading to Denial of Service | |
| Weaknesses | CWE-248 | |
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-07-04T22:03:46.893Z
Updated: 2025-07-08T13:53:36.518Z
Reserved: 2025-06-27T12:57:16.121Z
Link: CVE-2025-53365
Updated: 2025-07-08T13:53:31.799Z
Status : Awaiting Analysis
Published: 2025-07-04T22:15:22.117
Modified: 2025-07-08T16:18:53.607
Link: CVE-2025-53365