CVE-2025-69196

FastMCP is the standard framework for building MCP applications. Prior to version 2.14.2, the server does not properly respect the resource parameter submitted by the client in the authorization and token request. Instead of issuing the token explicitly for the MCP server, the token is issued for the base_url passed to the OAuthProxy during initialization. This issue has been patched 2.14.2.
References
Link Resource
https://github.com/PrefectHQ/fastmcp/security/advisories/GHSA-5h2m-4q8j-pqpj Exploit Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:jlowin:fastmcp:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-16 19:16

Updated : 2026-03-18 15:11


NVD link : CVE-2025-69196

Mitre link : CVE-2025-69196

CVE.ORG link : CVE-2025-69196


JSON object : View

Products Affected

jlowin

  • fastmcp
CWE
CWE-863

Incorrect Authorization