CVE-2026-0621 - MCP TypeScript SDK UriTemplate Exploded Array Pattern ReDoS - Analysis

CVE-2026-0621 - MCP TypeScript SDK UriTemplate Exploded Array Pattern ReDoS - Analysis

CVE ID : CVE-2026-0621 Published : Jan. 5, 2026, 8:57 p.m. | 14 minutes ago Description : Anthropic's MCP TypeScript SDK versions up to and including 1.25.1 contain a regular expression denial of service (ReDoS) vulnerability in the UriTemplate class when processing RFC 6570 exploded array patterns. The dynamically generated regular expression used during URI matching contains nested quantifiers that can trigger catastrophic backtracking on specially crafted inputs, resulting in excessive CPU consumption. An attacker can exploit this by supplying a malicious URI that causes the Node.js process to become unresponsive, leading to a denial of service. Severity: 8.7 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
HIGH
Published
Jan. 5, 2026
Affected Product: Node.js
Impact: denial of service

Source: Telegram CVE Monitor