Impact
The vulnerability in the mcp‑memory-service arises from its /api/health/detailed endpoint leaking OS version, Python version, CPU count, memory totals, disk usage, and the full database filesystem path. Because MCP_ALLOW_ANONYMOUS_ACCESS=true enables anonymous access, an attacker with network visibility can request this endpoint without authentication. The disclosed data can be used to build a detailed reconnaissance profile of the host, identify potential weaknesses in the operating system or runtime, and facilitate further attacks. The weakness is a classic information disclosure (CWE‑200).
Affected Systems
Doobidoo’s mcp‑memory-service prior to version 10.21.0 is affected. Systems that have configured the service with MCP_ALLOW_ANONYMOUS_ACCESS=true and the default 0.0.0.0 listening interface are vulnerable. The vulnerability is absent in releases 10.21.0 and later.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. The EPSS score is less than 1 %, implying a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. An attacker who can reach the network‑exposed health endpoint can trivially access the sensitive data; no special privileges, configuration or credential are required. Because the broadcasted data contains identifiers of the OS, runtime, and filesystem, it eases future targeted attacks. The attack vector is network based and open for any host that can resolve the service's IP.
OpenCVE Enrichment
Github GHSA