Impact
The vulnerability originates from a misconfigured Cross-Origin Resource Sharing (CORS) policy in the FastAPI middleware of mcp‑memory‑service. The server allows any origin with credentials and accepts any HTTP method and header, while anonymous access is enabled. This configuration enables a malicious website to read, modify, and delete any memory stored in the service via browser requests.
Affected Systems
The affected product is doobidoo’s open‑source mcp‑memory‑service. All releases prior to 10.25.1 are vulnerable when the HTTP interface is enabled (MCP_HTTP_ENABLED=true) and anonymous access is permitted (MCP_ALLOW_ANONYMOUS_ACCESS=true). No other vendors appear to be affected.
Risk and Exploitability
The CVSS score of 8.1 indicates high severity. The EPSS score is below 1%, and the vulnerability is not listed in CISA’s KEV catalog, suggesting a relatively low likelihood of exploitation. However, based on the description, it is inferred that the likely attack vector is a browser‑based cross‑origin request from a malicious site that can include credentials and retrieve or manipulate data stored by the service.
OpenCVE Enrichment
Github GHSA