INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Cryptocurrency CRITICAL 45m Global general Financial Services and E-commerce MEDIUM 48m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 45m Global general Financial Services and E-commerce MEDIUM 48m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 45m Global general Financial Services and E-commerce MEDIUM 48m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h
Vulnerabilities

CVE-2026-0621

High ⚡ Exploit Available
ReDoS Vulnerability in Anthropic MCP TypeScript SDK URI Template Processing
CWE-1333 — Weakness Type
Published: Jan 5, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
7.5
🔗 NVD Official
📄 Description (English)

Anthropic's MCP TypeScript SDK versions up to and including 1.25.1 contain a regular expression denial of service (ReDoS) vulnerability in the UriTemplate class when processing RFC 6570 exploded array patterns. The dynamically generated regular expression used during URI matching contains nested quantifiers that can trigger catastrophic backtracking on specially crafted inputs, resulting in excessive CPU consumption. An attacker can exploit this by supplying a malicious URI that causes the Node.js process to become unresponsive, leading to a denial of service.

🤖 AI Executive Summary

Anthropic's MCP TypeScript SDK versions up to 1.25.1 contain a critical regular expression denial of service (ReDoS) vulnerability in the UriTemplate class. Attackers can exploit nested quantifiers in RFC 6570 URI pattern matching to trigger catastrophic backtracking, causing Node.js processes to become unresponsive and resulting in complete service disruption. Active exploits exist with no official patch currently available.

📄 Description (Arabic)

تؤثر هذه الثغرة على فئة UriTemplate في حزمة MCP TypeScript SDK حيث يتم إنشاء تعبيرات نمطية ديناميكياً لمعالجة أنماط المصفوفات المفصلة وفق معيار RFC 6570. تحتوي هذه التعبيرات على محددات كمية متداخلة تؤدي إلى التراجع الكارثي عند معالجة مدخلات URI مصممة بشكل خبيث. ينتج عن ذلك استهلاك مفرط لموارد المعالج CPU مما يجعل عمليات Node.js غير مستجيبة. يمكن للمهاجم استغلال هذه الثغرة عن بعد دون الحاجة لصلاحيات خاصة، مما يؤدي إلى حرمان كامل من الخدمة للتطبيقات المعتمدة على هذه المكتبة.

🤖 ملخص تنفيذي (AI)

تحتوي حزمة MCP TypeScript SDK من Anthropic حتى الإصدار 1.25.1 على ثغرة حرجة لحرمان الخدمة عبر التعبيرات النمطية (ReDoS) في فئة UriTemplate. يمكن للمهاجمين استغلال المحددات الكمية المتداخلة في مطابقة أنماط URI وفق RFC 6570 لتفعيل التراجع الكارثي، مما يتسبب في توقف عمليات Node.js ويؤدي إلى تعطيل الخدمة بالكامل. توجد استغلالات نشطة دون توفر تصحيح رسمي حالياً.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:31
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations utilizing MCP TypeScript SDK in API gateways, microservices architectures, or AI integration platforms face immediate risk of service disruption. Financial institutions under SAMA supervision and critical infrastructure operators regulated by NCA are particularly vulnerable if using affected versions in customer-facing or internal systems, potentially violating availability requirements and SLA commitments.
🏢 Affected Saudi Sectors
الخدمات المالية والمصرفية تقنية المعلومات والاتصالات الخدمات الحكومية الرقمية التجارة الإلكترونية الرعاية الصحية الرقمية الذكاء الاصطناعي والتقنيات الناشئة
🎯 MITRE ATT&CK Techniques
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately identify all systems using MCP TypeScript SDK versions ≤1.25.1 through dependency scanning and inventory management, prioritizing internet-facing applications and critical business services.
2. Implement input validation and rate limiting on URI endpoints to restrict malicious pattern submissions, enforce maximum URI length limits (recommended <2048 characters), and deploy Web Application Firewall (WAF) rules to detect suspicious URI patterns with excessive special characters.
3. Monitor for patch releases from Anthropic and establish temporary compensating controls including process monitoring for CPU spikes, automatic service restart mechanisms, and consider temporarily replacing affected SDK components with alternative URI parsing libraries until official patches are available.
🔧 خطوات المعالجة (العربية)
1. تحديد فوري لجميع الأنظمة التي تستخدم حزمة MCP TypeScript SDK بالإصدارات ≤1.25.1 من خلال فحص التبعيات وإدارة الجرد، مع إعطاء الأولوية للتطبيقات المتصلة بالإنترنت والخدمات الحيوية للأعمال.
2. تطبيق التحقق من صحة المدخلات وتحديد معدل الطلبات على نقاط نهاية URI لتقييد إرسال الأنماط الخبيثة، وفرض حدود قصوى لطول URI (يوصى بأقل من 2048 حرف)، ونشر قواعد جدار حماية تطبيقات الويب (WAF) للكشف عن أنماط URI المشبوهة ذات الأحرف الخاصة المفرطة.
3. مراقبة إصدارات التصحيح من Anthropic وإنشاء ضوابط تعويضية مؤقتة تشمل مراقبة العمليات لارتفاعات استهلاك المعالج، وآليات إعادة تشغيل الخدمة التلقائية، والنظر في استبدال مكونات SDK المتأثرة مؤقتاً بمكتبات بديلة لتحليل URI حتى توفر التصحيحات الرسمية.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 (Vulnerability Management) ECC-3-1 (System and Network Security) ECC-5-1 (Availability Management) ECC-1-3 (Patch Management)
🔵 SAMA CSF
CCC-1.1.1 (Asset Management) CCC-3.1.2 (Vulnerability Assessment) CCC-4.2.1 (Availability Controls) CCC-5.1.3 (Incident Response)
🟡 ISO 27001:2022
A.12.6.1 (Management of Technical Vulnerabilities) A.14.2.1 (Secure Development Policy) A.17.2.1 (Availability of Information Processing Facilities)
📦 Affected Products / CPE 1 entries
lfprojects:mcp_typescript_sdk
📊 CVSS Score
7.5
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityN — None / Network
IntegrityN — None / Network
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score7.5
CWECWE-1333
EPSS0.02%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-01-05
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
exploit-available CWE-1333
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.