FastMCP is the standard framework for building MCP applications. Prior to version 2.14.2, the server does not properly respect the resource parameter submitted by the client in the authorization and token request. Instead of issuing the token explicitly for the MCP server, the token is issued for the base_url passed to the OAuthProxy during initialization. This issue has been patched 2.14.2.
References
| Link | Resource |
|---|---|
| https://github.com/PrefectHQ/fastmcp/security/advisories/GHSA-5h2m-4q8j-pqpj | Exploit Mitigation Vendor Advisory |
Configurations
History
18 Mar 2026, 15:11
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| CPE | cpe:2.3:a:jlowin:fastmcp:*:*:*:*:*:*:*:* | |
| Summary |
|
|
| References | () https://github.com/PrefectHQ/fastmcp/security/advisories/GHSA-5h2m-4q8j-pqpj - Exploit, Mitigation, Vendor Advisory | |
| First Time |
Jlowin
Jlowin fastmcp |
16 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-16 19:16
Updated : 2026-03-18 15:11
NVD link : CVE-2025-69196
Mitre link : CVE-2025-69196
CVE.ORG link : CVE-2025-69196
JSON object : View
Products Affected
jlowin
- fastmcp
CWE
CWE-863
Incorrect Authorization
