7.5
CVE-2026-39885
- EPSS 0.03%
- Veröffentlicht 08.04.2026 20:34:20
- Zuletzt bearbeitet 15.04.2026 19:04:51
- Quelle security-advisories@github.com
- CVE-Watchlists
- Unerledigt
FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL restrictions or custom resolvers. A malicious OpenAPI specification containing $ref values pointing to internal network addresses, cloud metadata endpoints, or local files will cause the library to fetch those resources during the initialize() call. This enables Server-Side Request Forgery (SSRF) and local file read attacks when processing untrusted OpenAPI specifications. This vulnerability is fixed in 2.3.0.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Agentfront ≫ @frontmcp/adapters SwPlatformnode.js Version < 1.0.4
Agentfront ≫ @frontmcp/sdk SwPlatformnode.js Version < 1.0.4
Agentfront ≫ Frontmcp SwPlatformnode.js Version < 1.0.4
Frontmcp ≫ Mcp-from-openapi SwPlatformnode.js Version < 2.3.0
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.092 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-advisories@github.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
|
CWE-918 Server-Side Request Forgery (SSRF)
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.