Description
Server-Side Request Forgery via SW-URL Header vulnerability in Apache SkyWalking MCP.

This issue affects Apache SkyWalking MCP: 0.1.0.

Users are recommended to upgrade to version 0.2.0, which fixes this issue.
Published: 2026-04-13
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery allowing launch of arbitrary outbound requests from the Apache SkyWalking MCP server
Action: Patch immediately
AI Analysis

Impact

The SSH‑SkyWalking MCP service is vulnerable to Server‑Side Request Forgery through its SW‑URL header. A remote user who can send a request to the MCP can supply a value for the SW‑URL header that the server will resolve and fetch on its behalf. This flaw allows an attacker to target any network host reachable from the MCP, potentially exposing confidential data or enabling pivoting into internal systems. The weakness is identified as CWE‑918, reflecting a classic SSRF vulnerability that compromises confidentiality, integrity, and availability of downstream services.

Affected Systems

Apache SkyWalking MCP version 0.1.0 is affected. The vendor recommends upgrading to 0.2.0, which includes the fix. Any deployment running 0.1.0 is potentially exposed.

Risk and Exploitability

The CVSS score of 7.1 indicates a high likelihood of exploitation if an attacker can reach the MCP endpoint. No EPSS score is available, and the issue is not listed in the CISA KEV catalog, implying no known active exploitation yet. However, the attack requires only a crafted request containing a malicious SW‑URL header, which makes exploitation straightforward for anyone with network access to the MCP. Successful exploitation would allow the attacker to compel the server to contact arbitrary URLs, potentially leaking internal data or enabling further compromises.

Generated by OpenCVE AI on April 13, 2026 at 15:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading Apache SkyWalking MCP to version 0.2.0.
  • Verify that the MCP service no longer accepts unauthorized SW‑URL headers after the upgrade.
  • If an immediate upgrade is not possible, restrict external network access to the MCP endpoint and monitor for suspicious requests.

Generated by OpenCVE AI on April 13, 2026 at 15:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c4hg-6933-x62x Apache SkyWalking MCP: Server-Side Request Forgery via SW-URL Header in MCP Server
History

Mon, 20 Apr 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache skywalking Mcp
CPEs cpe:2.3:a:apache:skywalking_mcp:*:*:*:*:*:*:*:*
Vendors & Products Apache skywalking Mcp

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache skywalking
Vendors & Products Apache
Apache skywalking

Mon, 13 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
References

Mon, 13 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 13 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery via SW-URL Header vulnerability in Apache SkyWalking MCP. This issue affects Apache SkyWalking MCP: 0.1.0. Users are recommended to upgrade to version 0.2.0, which fixes this issue.
Title Apache SkyWalking MCP: Server-Side Request Forgery via SW-URL Header in MCP Server
Weaknesses CWE-918
References

Subscriptions

Apache Skywalking Skywalking Mcp
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-04-13T15:29:57.926Z

Reserved: 2026-03-28T02:38:58.575Z

Link: CVE-2026-34476

cve-icon Vulnrichment

Updated: 2026-04-13T15:29:57.926Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-13T13:16:40.847

Modified: 2026-04-20T16:45:47.080

Link: CVE-2026-34476

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-14T16:34:35Z

Weaknesses