一、 漏洞 CVE-2025-53365 基础信息
漏洞信息
                                        神龙正在分析中.
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
MCP Python SDK has Unhandled Exception in Streamable HTTP Transport ,Leading to Denial of Service
来源:美国国家漏洞数据库 NVD
漏洞描述信息
The MCP Python SDK, called `mcp` on PyPI, is a Python implementation of the Model Context Protocol (MCP). Prior to version 1.10.0, if a client deliberately triggers an exception after establishing a streamable HTTP session, this can lead to an uncaught ClosedResourceError on the server side, causing the server to crash and requiring a restart to restore service. Impact may vary depending on the deployment conditions, and presence of infrastructure-level resilience measures. Version 1.10.0 contains a patch for the issue.
来源:美国国家漏洞数据库 NVD
CVSS信息
N/A
来源:美国国家漏洞数据库 NVD
漏洞类别
未捕获的异常
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2025-53365 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2025-53365 的情报信息
  • 标题: Fix uncaught exception in MCP server by ddworken · Pull Request #967 · modelcontextprotocol/python-sdk · GitHub -- 🔗来源链接

    标签: x_refsource_MISC

  • 标题: Unhandled Exception in Streamable HTTP Transport Leading to Denial of Service · Advisory · modelcontextprotocol/python-sdk · GitHub -- 🔗来源链接

    标签: x_refsource_CONFIRM

  • 标题: Fix uncaught exception in MCP server (#967) · modelcontextprotocol/python-sdk@7b42065 · GitHub -- 🔗来源链接

    标签: x_refsource_MISC

  • https://nvd.nist.gov/vuln/detail/CVE-2025-53365