Description
The Pydantic-AI MCP Run Python tool configures the Deno sandbox with an overly permissive configuration that allows the underlying Python code to access the localhost interface of the host to perform SSRF attacks. Note - the "mcp-run-python" project is archived and unlikely to receive a fix.
Published: 2026-02-09
Score: 5.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server Side Request Forgery (SSRF)
Action: Apply Workaround
AI Analysis

Impact

The vulnerability results from an overly permissive Deno sandbox configuration in the Pydantic‑AI mcp‑run‑python tool. Python code executed inside the sandbox is granted unrestricted access to the localhost network interface of the host machine. This allows an attacker to issue internal HTTP requests from the tool, effectively enabling server‑side request forgery. The flaw could let an adversary probe internal services, exfiltrate data, or pivot to additional targets within the host, as the code runs with local privileges.

Affected Systems

Pydantic‑AI mcp‑run‑python, an archived project with no maintained updates or patch releases. No specific release versions are documented, and the tool remains unchanged since its last activity.

Risk and Exploitability

The CVSS score of 5.8 indicates moderate severity, while the EPSS score of less than 1% suggests a very low probability of exploitation in the wild. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires an attacker to run malicious Python code that the mcp‑run‑python sandbox executes; from that position the attacker can send arbitrary requests to the host’s localhost interface. Because the project is archived and unlikely to receive a fix, the risk must be mitigated through configuration changes or by discontinuing use of the tool.

Generated by OpenCVE AI on April 18, 2026 at 13:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Reconfigure the Deno sandbox to deny network access to the localhost interface or restrict it to only required external domains
  • Remove or deprecate the mcp‑run‑python tool from active environments, since the project is archived
  • Implement network monitoring to detect unexpected HTTP requests originating from the Deno sandbox to internal services

Generated by OpenCVE AI on April 18, 2026 at 13:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6fgp-m6q4-j3q5 MCP Run Python Deno Sandbox Misconfiguration Allows SSRF Attacks via Localhost Access
History

Tue, 10 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
First Time appeared Pydantic-ai
Pydantic-ai mcp-run-python
Vendors & Products Pydantic-ai
Pydantic-ai mcp-run-python

Mon, 09 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 09:00:00 +0000

Type Values Removed Values Added
Description The Pydantic-AI MCP Run Python tool configures the Deno sandbox with an overly permissive configuration that allows the underlying Python code to access the localhost interface of the host to perform SSRF attacks. Note - the "mcp-run-python" project is archived and unlikely to receive a fix.
Title Overly permissive Deno configuration in mcp-run-python leads to SSRF
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Pydantic-ai Mcp-run-python
cve-icon MITRE

Status: PUBLISHED

Assigner: JFROG

Published:

Updated: 2026-02-09T14:04:04.176Z

Reserved: 2026-02-08T11:19:42.864Z

Link: CVE-2026-25904

cve-icon Vulnrichment

Updated: 2026-02-09T14:03:39.564Z

cve-icon NVD

Status : Deferred

Published: 2026-02-09T09:16:33.850

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-25904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T13:15:25Z

Weaknesses