CVE-2026-39885
Atak SSRF w bibliotece mcp-from-openapi pozwala na pobieranie złośliwych zasobów z wewnętrznych adresów.
FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL restrictions or custom resolvers. A malicious OpenAPI specification containing $ref values pointing to internal network addresses, cloud metadata endpoints, or local files will cause the library to fetch those resources during the initialize() call. This enables Server-Side Request Forgery (SSRF) and local file read attacks when processing untrusted OpenAPI specifications. This vulnerability is fixed in 2.3.0.
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-08 21:17:00 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-09 17:16:29 UTC |
- https://github.com/agentfront/frontmcp/releases/tag/v1.0.4 (security-advisories@github.com)
- https://github.com/agentfront/frontmcp/security/advisories/GHSA-v6ph-xcq9-qxxj (security-advisories@github.com)