Reuse of session IDs in oatpp-mcp leads to session hijacking and prompt hijacking by remote attackers
oatpp:oatpp-mcp
(,)
The MCP SSE endpoint in oatpp-mcp returns an instance pointer as the session ID, which is not unique nor cryptographically secure. This allows network attackers with access to the oatpp-mcp server to guess future session IDs and hijack legitimate client MCP sessions, returning malicious responses from the oatpp-mcp server.
No PoC is supplied for this vulnerability
No mitigations are supplied for this issue