Impact
The vulnerability occurs in the OAuth consent form of ha-mcp (Home Assistant MCP Server) where an unauthenticated user can supply an arbitrary ha_url that the server uses to perform a server‑side HTTP request to {ha_url}/api/config without validating the URL. This behavior constitutes a Server‑Side Request Forgery (CWE‑918) and allows the attacker to trigger error responses, which serve as an oracle for discovering internal network information, resulting in information disclosure.
Affected Systems
Affected products include homeassistant‑ai:ha‑mcp. All versions prior to 7.0.0 are impacted; the fix is delivered in 7.0.0.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, and the EPSS score is below 1 %, with no listing in the CISA KEV catalog. Exploitation requires an unauthenticated attacker to submit arbitrary URLs during the OAuth consent flow; the weakness is limited to internal network reconnaissance and does not provide remote code execution or elevated privileges.
OpenCVE Enrichment
Github GHSA