Impact
The SSH‑SkyWalking MCP service is vulnerable to Server‑Side Request Forgery through its SW‑URL header. A remote user who can send a request to the MCP can supply a value for the SW‑URL header that the server will resolve and fetch on its behalf. This flaw allows an attacker to target any network host reachable from the MCP, potentially exposing confidential data or enabling pivoting into internal systems. The weakness is identified as CWE‑918, reflecting a classic SSRF vulnerability that compromises confidentiality, integrity, and availability of downstream services.
Affected Systems
Apache SkyWalking MCP version 0.1.0 is affected. The vendor recommends upgrading to 0.2.0, which includes the fix. Any deployment running 0.1.0 is potentially exposed.
Risk and Exploitability
The CVSS score of 7.1 indicates a high likelihood of exploitation if an attacker can reach the MCP endpoint. No EPSS score is available, and the issue is not listed in the CISA KEV catalog, implying no known active exploitation yet. However, the attack requires only a crafted request containing a malicious SW‑URL header, which makes exploitation straightforward for anyone with network access to the MCP. Successful exploitation would allow the attacker to compel the server to contact arbitrary URLs, potentially leaking internal data or enabling further compromises.
OpenCVE Enrichment
Github GHSA