CVE-2026-33946
MCP Ruby SDK: Insufficient Session Binding Allows SSE Stream Hijacking via Session ID Replay
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
15th
MCP Ruby SDK is the official Ruby SDK for Model Context Protocol servers and clients. Prior to version 0.9.2, the Ruby SDK's streamable_http_transport.rb implementation contains a session hijacking vulnerability. An attacker who obtains a valid session ID can completely hijack the victim's Server-Sent Events (SSE) stream and intercept all real-time data. Version 0.9.2 contains a patch.
| CWE | CWE-384 CWE-639 |
| Vendor | modelcontextprotocol |
| Product | ruby-sdk |
| Published | Mar 27, 2026 |
| Last Updated | Mar 30, 2026 |
Stay Ahead of the Next One
Get instant alerts for modelcontextprotocol ruby-sdk
Be the first to know when new unknown vulnerabilities affecting modelcontextprotocol ruby-sdk are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
modelcontextprotocol / ruby-sdk
< 0.9.2
References
github.com: https://github.com/modelcontextprotocol/ruby-sdk/security/advisories/GHSA-qvqr-5cv7-wh35 github.com: https://github.com/modelcontextprotocol/ruby-sdk/commit/db40143402d65b4fb6923cec42d2d72cb89b3874 hackerone.com: https://hackerone.com/reports/3556146 github.com: https://github.com/modelcontextprotocol/csharp-sdk/blob/main/src/ModelContextProtocol.AspNetCore/SseHandler.cs#L93-L97 github.com: https://github.com/modelcontextprotocol/go-sdk/blob/main/mcp/streamable.go#L281C1-L288C2 github.com: https://github.com/modelcontextprotocol/python-sdk/blob/main/src/mcp/server/streamable_http.py#L680-L685 github.com: https://github.com/modelcontextprotocol/ruby-sdk/blob/main/examples/streamable_http_server.rb github.com: https://github.com/modelcontextprotocol/ruby-sdk/releases/tag/v0.9.2