Description
FastMCP is the standard framework for building MCP applications. Prior to version 3.2.0, while testing the GitHubProvider OAuth integration, which allows authentication to a FastMCP MCP server via a FastMCP OAuthProxy using GitHub OAuth, it was discovered that the FastMCP OAuthProxy does not properly validate the user's consent upon receiving the authorization code from GitHub. In combination with GitHub’s behavior of skipping the consent page for previously authorized clients, this introduces a Confused Deputy vulnerability. This issue has been patched in version 3.2.0.
Published: 2026-04-03
Score: 8.2 High
EPSS: n/a
KEV: No
Impact: Confused Deputy vulnerability allowing unauthorized OAuth authorization
Action: Apply Patch
AI Analysis

Impact

FastMCP, a framework for building MCP applications, contained a flaw in its OAuthProxy before version 3.2.0. The proxy failed to validate the user’s consent when receiving an authorization code from GitHub, exploiting GitHub’s omission of the consent screen for previously authorized clients. This creates a Confused Deputy scenario identified as CWE-441, which could let an attacker obtain authorization for resources on behalf of a legitimate user without the user’s explicit approval. The result is an unauthorized gain of access to user data where the OAuth delegation is trusted, leading to confidentiality and integrity violations for the affected user’s account.

Affected Systems

FastMCP framework from the vendor jlowin, affecting all releases prior to 3.2.0. Users running any earlier version of FastMCP that implements GitHubProvider OAuth integration are potentially impacted.

Risk and Exploitability

The vulnerability carries a CVSS score of 8.2, indicating high severity, and has not been listed in the CISA KEV catalog. EPSS data is not available, so the precise exploit probability cannot be quantified, but the combination of a high CVSS score and the nature of the flaw suggests a significant risk to systems that rely on FastMCP’s OAuthProxy. The attack vector is most likely via the OAuth callback, where a malicious party can intercept or redirect the authorization code flow. Exploitation requires that the target client has previously authorized access to the relevant GitHub account, a situation common in existing deployments.

Generated by OpenCVE AI on April 3, 2026 at 18:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade FastMCP to version 3.2.0 or later, which contains the patch for the missing consent verification bug

Generated by OpenCVE AI on April 3, 2026 at 18:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rww4-4w9c-7733 FastMCP: Missing Consent Verification in OAuth Proxy Callback Facilitates Confused Deputy Vulnerabilities
History

Fri, 03 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Jlowin
Jlowin fastmcp
Vendors & Products Jlowin
Jlowin fastmcp

Fri, 03 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 03 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Description FastMCP is the standard framework for building MCP applications. Prior to version 3.2.0, while testing the GitHubProvider OAuth integration, which allows authentication to a FastMCP MCP server via a FastMCP OAuthProxy using GitHub OAuth, it was discovered that the FastMCP OAuthProxy does not properly validate the user's consent upon receiving the authorization code from GitHub. In combination with GitHub’s behavior of skipping the consent page for previously authorized clients, this introduces a Confused Deputy vulnerability. This issue has been patched in version 3.2.0.
Title FastMCP: Missing Consent Verification in OAuth Proxy Callback Facilitates Confused Deputy Vulnerabilities
Weaknesses CWE-441
References
Metrics cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-03T16:44:20.749Z

Reserved: 2026-02-17T18:42:27.043Z

Link: CVE-2026-27124

cve-icon Vulnrichment

Updated: 2026-04-03T16:44:08.349Z

cve-icon NVD

Status : Received

Published: 2026-04-03T16:16:36.453

Modified: 2026-04-03T17:16:41.970

Link: CVE-2026-27124

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T21:15:20Z

Weaknesses