MCP Ruby SDK is the official Ruby SDK for Model Context Protocol servers and clients. Prior to version 0.9.2, the Ruby SDK's streamable_http_transport.rb implementation contains a session hijacking vulnerability. An attacker who obtains a valid session ID can completely hijack the victim's Server-Sent Events (SSE) stream and intercept all real-time data. Version 0.9.2 contains a patch.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qvqr-5cv7-wh35 | MCP Ruby SDK: Insufficient Session Binding Allows SSE Stream Hijacking via Session ID Replay |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 30 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 30 Mar 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Modelcontextprotocol
Modelcontextprotocol ruby-sdk |
|
| Vendors & Products |
Modelcontextprotocol
Modelcontextprotocol ruby-sdk |
Sat, 28 Mar 2026 03:15:00 +0000
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-30T18:42:43.387Z
Reserved: 2026-03-24T19:50:52.105Z
Link: CVE-2026-33946
Updated: 2026-03-30T18:42:28.737Z
Status : Awaiting Analysis
Published: 2026-03-27T22:16:21.580
Modified: 2026-03-30T19:16:26.213
Link: CVE-2026-33946
No data.
OpenCVE Enrichment
Updated: 2026-03-30T07:59:17Z
Github GHSA