The vulnerability arises when a client fetches a tools’ JSON specification, known as a Manual, from a remote Manual Endpoint. While a provider may initially serve a benign manual (e.g., one defining an HTTP tool call), earning the clients’ trust, a malicious provider can later change the manual to exploit the client.
{
"github_reviewed": true,
"cwe_ids": [
"CWE-501"
],
"nvd_published_at": "2025-12-13T16:16:51Z",
"github_reviewed_at": "2025-12-15T23:55:42Z",
"severity": "HIGH"
}