<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Kuadrant — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/kuadrant/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 19:43:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/kuadrant/feed.xml" rel="self" type="application/rss+xml"/><item><title>MCP Gateway Authority Injection and JWT/Session Bypass via Unauthenticated Router Hairpin</title><link>https://feed.craftedsignal.io/briefs/2026-05-mcp-gateway-auth-bypass/</link><pubDate>Tue, 19 May 2026 19:43:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mcp-gateway-auth-bypass/</guid><description>The MCP router exposes an initialize method code path that bypasses the gateway JWT session validator and rewrites the upstream :authority header, gated only by a shared header value, allowing attackers to bypass authorization and access backend services.</description><content:encoded><![CDATA[<p>The MCP router (ext_proc) in Kuadrant mcp-gateway versions 0.6.1 and earlier exposes an <code>initialize</code> method code path that allows for a critical authentication and authorization bypass. This vulnerability stems from the insufficient validation of the <code>mcp-init-host</code> header when present in a request. The presence of this header, combined with a correct <code>router-key</code> (either the hardcoded &ldquo;secret-api-key&rdquo; or a SHA-256 truncation of the <code>MCPGatewayExtension</code> UID), bypasses the gateway&rsquo;s JWT session validator. This allows an attacker to rewrite the upstream <code>:authority</code> header to an arbitrary value, effectively impersonating any service. This bypasses both the broker&rsquo;s <code>x-mcp-authorized</code> capability filter and the gateway&rsquo;s JWT-based session model, granting unauthorized access to backend listeners registered with the gateway.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable mcp-gateway instance (version &lt;= 0.6.1).</li>
<li>The attacker obtains the <code>router-key</code>. This is either the default &ldquo;secret-api-key&rdquo; or, in controller-managed deployments, the SHA-256 truncation of the <code>MCPGatewayExtension</code> UID, which is accessible with <code>get</code> permissions or via the <code>--mcp-router-key</code> parameter.</li>
<li>The attacker crafts a malicious HTTP request containing the <code>mcp-init-host</code> header and the correct <code>router-key</code> header.</li>
<li>The attacker sets the <code>:authority</code> header within the crafted request to a desired, potentially sensitive, backend service.</li>
<li>The MCP router, upon receiving the request with the <code>mcp-init-host</code> and valid <code>router-key</code>, bypasses the JWT session validator.</li>
<li>The MCP router rewrites the upstream <code>:authority</code> header based on the attacker&rsquo;s provided value.</li>
<li>The request is forwarded to the targeted backend listener registered with the gateway.</li>
<li>The attacker gains unauthorized access to the backend service, effectively bypassing authentication and authorization mechanisms.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to completely bypass authentication and authorization controls in the MCP gateway. This can lead to unauthorized access to sensitive backend services, data exfiltration, and other malicious activities. The critical nature of this vulnerability lies in its ability to grant complete control over the <code>:authority</code> header, which is a fundamental component of service identification and routing. If the default <code>router-key</code> is in use, any internet-exposed mcp-gateway is trivially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Kuadrant mcp-gateway to a version greater than 0.6.1 to patch the vulnerability described in GHSA-g53w-w6mj-hrpp.</li>
<li>Rotate the <code>MCPGatewayExtension</code> UID, if in use, to invalidate previously exposed <code>router-key</code> values.</li>
<li>Deploy the Sigma rule &ldquo;Detect MCP Gateway Authentication Bypass Attempt&rdquo; to detect attempts to exploit this vulnerability by monitoring for the presence of the <code>mcp-init-host</code> header with the default <code>router-key</code> value in web server logs.</li>
<li>Monitor MCPGatewayExtension resources for unauthorized access that could lead to router-key exposure.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authentication-bypass</category><category>authorization-bypass</category><category>jwt-bypass</category></item></channel></rss>