CVE-2026-33946

MCP Ruby SDK is the official Ruby SDK for Model Context Protocol servers and clients. Prior to version 0.9.2, the Ruby SDK's streamable_http_transport.rb implementation contains a session hijacking vulnerability. An attacker who obtains a valid session ID can completely hijack the victim's Server-Sent Events (SSE) stream and intercept all real-time data. Version 0.9.2 contains a patch.
Configurations

Configuration 1 (hide)

cpe:2.3:a:lfprojects:mcp_ruby_sdk:*:*:*:*:*:*:*:*

History

02 Apr 2026, 15:23

Type Values Removed Values Added
CPE cpe:2.3:a:lfprojects:mcp_ruby_sdk:*:*:*:*:*:*:*:*
First Time Lfprojects
Lfprojects mcp Ruby Sdk
References () https://github.com/modelcontextprotocol/csharp-sdk/blob/main/src/ModelContextProtocol.AspNetCore/SseHandler.cs#L93-L97 - () https://github.com/modelcontextprotocol/csharp-sdk/blob/main/src/ModelContextProtocol.AspNetCore/SseHandler.cs#L93-L97 - Patch
References () https://github.com/modelcontextprotocol/go-sdk/blob/main/mcp/streamable.go#L281C1-L288C2 - () https://github.com/modelcontextprotocol/go-sdk/blob/main/mcp/streamable.go#L281C1-L288C2 - Patch
References () https://github.com/modelcontextprotocol/python-sdk/blob/main/src/mcp/server/streamable_http.py#L680-L685 - () https://github.com/modelcontextprotocol/python-sdk/blob/main/src/mcp/server/streamable_http.py#L680-L685 - Patch
References () https://github.com/modelcontextprotocol/ruby-sdk/blob/main/examples/streamable_http_server.rb - () https://github.com/modelcontextprotocol/ruby-sdk/blob/main/examples/streamable_http_server.rb - Patch
References () https://github.com/modelcontextprotocol/ruby-sdk/commit/db40143402d65b4fb6923cec42d2d72cb89b3874 - () https://github.com/modelcontextprotocol/ruby-sdk/commit/db40143402d65b4fb6923cec42d2d72cb89b3874 - Patch
References () https://github.com/modelcontextprotocol/ruby-sdk/releases/tag/v0.9.2 - () https://github.com/modelcontextprotocol/ruby-sdk/releases/tag/v0.9.2 - Product, Release Notes
References () https://github.com/modelcontextprotocol/ruby-sdk/security/advisories/GHSA-qvqr-5cv7-wh35 - () https://github.com/modelcontextprotocol/ruby-sdk/security/advisories/GHSA-qvqr-5cv7-wh35 - Exploit, Vendor Advisory
References () https://hackerone.com/reports/3556146 - () https://hackerone.com/reports/3556146 - Permissions Required
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.9

30 Mar 2026, 19:16

Type Values Removed Values Added
References () https://github.com/modelcontextprotocol/ruby-sdk/security/advisories/GHSA-qvqr-5cv7-wh35 - () https://github.com/modelcontextprotocol/ruby-sdk/security/advisories/GHSA-qvqr-5cv7-wh35 -

27 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-27 22:16

Updated : 2026-04-02 15:23


NVD link : CVE-2026-33946

Mitre link : CVE-2026-33946

CVE.ORG link : CVE-2026-33946


JSON object : View

Products Affected

lfprojects

  • mcp_ruby_sdk
CWE
CWE-384

Session Fixation

CWE-639

Authorization Bypass Through User-Controlled Key