Description
MCPHub in versions below 0.11.0 is vulnerable to authentication bypass. Some endpoints are not protected by authentication middleware, allowing an unauthenticated attacker to perform actions in the name of other users and using their privileges.
Published: 2026-04-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Access
Action: Immediate Patch
AI Analysis

Impact

MCPHub versions prior to 0.11.0 contain an authentication bypass that allows an unauthenticated attacker to access endpoints lacking proper middleware protection. The flaw permits the attacker to perform actions on behalf of other users, effectively elevating privileges and potentially accessing or modifying data that should be restricted. This vulnerability is classified as CWE-639, representing an authorization bypass through user‑controlled information.

Affected Systems

The vulnerability affects the MCPHub platform, specifically any deployment running a version older than 0.11.0. No other vendors or product names are listed in the CNA data, so the impact is limited to integral MCPHub installations using the affected code base.

Risk and Exploitability

The CVSS score of 5.3 places the issue in the moderate severity range, and the EPSS score is not available, indicating uncertainty about current exploitation likelihood. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog, suggesting no widespread exploitation has been documented. The likely attack vector is from an external agent interacting with vulnerable HTTP endpoints that lack authentication checks. While exposure requires reaching these specific endpoints, once accessed, the attacker can perform any operation that the victim user is allowed to do, thereby compromising confidentiality, integrity, and availability of that user's data.

Generated by OpenCVE AI on April 14, 2026 at 11:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest MCPHub release (version 0.11.0 or newer) to eliminate the authentication bypass flaw.
  • If an immediate upgrade is not possible, constrain network access to MCPHub endpoints to trusted internal hosts or VPNs to reduce exposure to unauthenticated attackers.

Generated by OpenCVE AI on April 14, 2026 at 11:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9vq7-9h42-j88h MCPHub has an authentication bypass
History

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Mcphub
Mcphub mcphub
Vendors & Products Mcphub
Mcphub mcphub

Tue, 14 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
Description MCPHub in versions below 0.11.0 is vulnerable to authentication bypass. Some endpoints are not protected by authentication middleware, allowing an unauthenticated attacker to perform actions in the name of other users and using their privileges.
Title Authentication bypass in MCPHub
Weaknesses CWE-639
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-04-14T13:14:16.888Z

Reserved: 2025-12-01T13:03:39.659Z

Link: CVE-2025-13822

cve-icon Vulnrichment

Updated: 2026-04-14T13:08:50.784Z

cve-icon NVD

Status : Received

Published: 2026-04-14T11:16:24.300

Modified: 2026-04-14T11:16:24.300

Link: CVE-2025-13822

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:30:36Z

Weaknesses