Description
Agentgateway is an open source data plane for agentic AI connectivity within or across any agent framework or environment. Prior to version 0.12.0, when converting MCP tools/call request to OpenAPI request, input path, query, and header values are not sanitized. This issue has been patched in version 0.12.0.
Published: 2026-03-06
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Injection
Action: Apply Patch
AI Analysis

Impact

Agentgateway allows external systems to convert MCP tool calls into OpenAPI requests. In versions earlier than 0.12.0, the conversion process fails to sanitize input values for path segments, query parameters, and headers, creating a classic input validation flaw (CWE‑20). An attacker who can supply crafted MCP calls may cause the generated OpenAPI request to contain malformed or malicious values, potentially leading to unintended API behavior, information disclosure, or denial of service.

Affected Systems

All installations of Agentgateway older than version 0.12.0. The affected product is the open‑source data plane component named Agentgateway, as listed by the CNA vendor product pair agentgateway:agentgateway. No other vendor or product variants are referenced in the advisory.

Risk and Exploitability

The CVSS score of 4.9 indicates a moderate risk, and the EPSS score of less than 1% suggests the likelihood of real‑world exploitation is very low at present. The vulnerability is not currently listed in the CISA KEV catalog, further indicating limited exploitation activity. If an attacker can reach the MCP interface, they can manipulate the OpenAPI request generation, though this does not immediately grant arbitrary code execution. The principal risk lies in accidental or malicious alteration of downstream API requests.

Generated by OpenCVE AI on April 16, 2026 at 11:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Agentgateway to version 0.12.0 or later, which includes the input sanitization fixes for MCP to OpenAPI conversion.
  • If upgrade cannot be applied immediately, restrict network access to the MCP endpoint so that only trusted hosts can send conversion requests, reducing the attack surface.
  • Implement custom input validation or sanitization for path, query, and header values before they are passed to the OpenAPI converter, ensuring that only expected characters and formats are accepted.

Generated by OpenCVE AI on April 16, 2026 at 11:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v2x6-wwfw-r2rq Agentgateway is missing parameter sanitization in MCP to OpenAPI conversion
History

Wed, 18 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Lfprojects
Lfprojects agentgateway
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:lfprojects:agentgateway:*:*:*:*:*:*:*:*
Vendors & Products Lfprojects
Lfprojects agentgateway

Mon, 09 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Agentgateway
Agentgateway agentgateway
Vendors & Products Agentgateway
Agentgateway agentgateway

Fri, 06 Mar 2026 21:00:00 +0000

Type Values Removed Values Added
Description Agentgateway is an open source data plane for agentic AI connectivity within or across any agent framework or environment. Prior to version 0.12.0, when converting MCP tools/call request to OpenAPI request, input path, query, and header values are not sanitized. This issue has been patched in version 0.12.0.
Title Agentgateway: Missing parameter sanitization in MCP to OpenAPI conversion
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Agentgateway Agentgateway
Lfprojects Agentgateway
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T20:54:30.319Z

Reserved: 2026-03-04T16:26:02.900Z

Link: CVE-2026-29791

cve-icon Vulnrichment

Updated: 2026-03-09T20:51:42.473Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-06T21:16:15.787

Modified: 2026-03-18T19:03:44.357

Link: CVE-2026-29791

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:15:27Z

Weaknesses