Impact
The Nhost CLI MCP server, when explicitly configured to listen on a network port, omits inbound authentication and does not enforce strict CORS. This flaw allows a malicious web page running on the same host to send cross–origin requests that are treated as authenticated with the user’s local credentials, enabling the attacker to invoke privileged MCP tools and access local resources.
Affected Systems
The vulnerability affects Nhost CLI versions prior to 1.41.0 that are configured to bind to a network port. The default configuration, which does not expose a bound port, is not impacted. All other parameters remain unaffected.
Risk and Exploitability
The CVSS base score is 7.7, indicating high severity. The EPSS score is under 1 % and the flaw is not in the CISA KEV list, suggesting low likelihood of widespread exploitation. Exploitation requires the attacker to host a malicious page on the same machine as the vulnerable CLI and to have the CLI configured with a non‑default bound port; this limits the attack vector to local or attacker‑controlled environments.
OpenCVE Enrichment