CVE-2025-69196

FastMCP is the standard framework for building MCP applications. Prior to version 2.14.2, the server does not properly respect the resource parameter submitted by the client in the authorization and token request. Instead of issuing the token explicitly for the MCP server, the token is issued for the base_url passed to the OAuthProxy during initialization. This issue has been patched 2.14.2.
References
Link Resource
https://github.com/PrefectHQ/fastmcp/security/advisories/GHSA-5h2m-4q8j-pqpj Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jlowin:fastmcp:*:*:*:*:*:*:*:*

History

18 Mar 2026, 15:11

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:jlowin:fastmcp:*:*:*:*:*:*:*:*
Summary
  • (es) FastMCP es el framework estándar para construir aplicaciones MCP. Antes de la versión 2.14.2, el servidor no respeta adecuadamente el parámetro de recurso enviado por el cliente en la solicitud de autorización y de token. En lugar de emitir el token explícitamente para el servidor MCP, el token se emite para la base_url pasada al OAuthProxy durante la inicialización. Este problema ha sido parcheado en 2.14.2.
References () https://github.com/PrefectHQ/fastmcp/security/advisories/GHSA-5h2m-4q8j-pqpj - () https://github.com/PrefectHQ/fastmcp/security/advisories/GHSA-5h2m-4q8j-pqpj - Exploit, Mitigation, Vendor Advisory
First Time Jlowin
Jlowin fastmcp

16 Mar 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-16 19:16

Updated : 2026-03-18 15:11


NVD link : CVE-2025-69196

Mitre link : CVE-2025-69196

CVE.ORG link : CVE-2025-69196


JSON object : View

Products Affected

jlowin

  • fastmcp
CWE
CWE-863

Incorrect Authorization