CVE-2026-39885

🟡 Monitoruj

Atak SSRF w bibliotece mcp-from-openapi pozwala na pobieranie złośliwych zasobów z wewnętrznych adresów.

CVSS
7.5
EPSS
0.0%
Exploit
none
Vendor
Opis źródłowy (NVD)

FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL restrictions or custom resolvers. A malicious OpenAPI specification containing $ref values pointing to internal network addresses, cloud metadata endpoints, or local files will cause the library to fetch those resources during the initialize() call. This enables Server-Side Request Forgery (SSRF) and local file read attacks when processing untrusted OpenAPI specifications. This vulnerability is fixed in 2.3.0.

ssrf Brak patcha
Źródła i daty
ŹródłoWartość
NVD – CVSS7.5
CISA KEV (aktywnie wykorzystywane)Nie
FIRST EPSS (prawdopodobieństwo exploita)0.0%
Opublikowano (NVD)2026-04-08 21:17:00 UTC
Ostatnia modyfikacja (NVD)2026-04-09 17:16:29 UTC
Referencje