
FastAPI + MCP: Adding Real OAuth 2.1 Auth to Your Python MCP Server
In the nine days after the MCP Dev Summit, NVD recorded 20 new MCP CVEs. Auth validation failures are the dominant pattern. Two examples: CVE-2025-6514 — command injection in mcp-remote , CVSS 9.6, 500,000 downloads. CVE-2026-32211 — the Azure MCP Server's SSE transport had zero authentication. Attack chain: enumerate tools, call the shell-passthrough tool ( azmcp-extension-az ), write a script to ~/.bashrc , exfiltrate Entra ID credentials. Full tenant takeover. Microsoft CVSS: 9.1 CRITICAL. Root cause: CWE-306 — Missing Authentication for Critical Function. (NVD scores it 7.5 HIGH, reflecting only the confidentiality vector; Microsoft's score adds the integrity impact of the full tenant compromise.) Twenty CVEs in nine days. Auth isn't optional hardening for MCP servers. The summit ran April 2–3. Six sessions dedicated to authentication. Aaron Parecki — OAuth 2.1 spec author, Director of Identity Standards at Okta — headlined one of them: "Evolution, Not Revolution: How MCP Is Reshap
Continue reading on Dev.to
Opens in a new tab

