CVE-2026-27896

HIGH

Go MCP SDK <1.3.1 - Auth Bypass

Title source: llm
STIX 2.1

Description

The Go MCP SDK used Go's standard encoding/json.Unmarshal for JSON-RPC and MCP protocol message parsing in versions prior to 1.3.1. Go's standard library performs case-insensitive matching of JSON keys to struct field tags — a field tagged json:"method" would also match "Method", "METHOD", etc. This violated the JSON-RPC 2.0 specification, which defines exact field names. A malicious MCP peer may have been able to send protocol messages with non-standard field casing that the SDK would silently accept. This had the potential for bypassing intermediary inspection and coss-implementation inconsistency. Go's standard JSON unmarshaling was replaced with a case-sensitive decoder in commit 7b8d81c. Users are advised to update to v1.3.1 to resolve this issue.

Scores

CVSS v3 7.5
EPSS 0.0004
EPSS Percentile 13.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact partial

Details

CWE
CWE-178 CWE-436
Status published
Products (3)
lfprojects/mcp_go_sdk < 1.3.1
modelcontextprotocol/go-sdk 0 - 1.3.1Go
modelcontextprotocol/go-sdk < 1.3.1
Published Feb 26, 2026
Tracked Since Feb 26, 2026