Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-27896— MCP Go SDK Vulnerable to Improper Handling of Case Sensitivity

EPSS 0.04% · P14
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-27896

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
MCP Go SDK Vulnerable to Improper Handling of Case Sensitivity
Source: NVD (National Vulnerability Database)
Vulnerability Description
The Go MCP SDK used Go's standard encoding/json.Unmarshal for JSON-RPC and MCP protocol message parsing in versions prior to 1.3.1. Go's standard library performs case-insensitive matching of JSON keys to struct field tags — a field tagged json:"method" would also match "Method", "METHOD", etc. This violated the JSON-RPC 2.0 specification, which defines exact field names. A malicious MCP peer may have been able to send protocol messages with non-standard field casing that the SDK would silently accept. This had the potential for bypassing intermediary inspection and coss-implementation inconsistency. Go's standard JSON unmarshaling was replaced with a case-sensitive decoder in commit 7b8d81c. Users are advised to update to v1.3.1 to resolve this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
大小写敏感处理不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
MCP Go SDK 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
MCP Go SDK是Model Context Protocol开源的一个模型上下文协议开发工具包。 MCP Go SDK 1.3.1之前版本存在安全漏洞,该漏洞源于JSON-RPC和MCP协议消息解析时使用大小写不敏感的JSON键匹配,可能导致绕过中间检查和跨实现不一致。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
modelcontextprotocolgo-sdk < 1.3.1 -

II. Public POCs for CVE-2026-27896

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-27896

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-27896

No comments yet


Leave a comment