Description
Network-AI is a TypeScript/Node.js multi-agent orchestrator. Prior to 5.1.3, the MCP HTTP transport accepts JSON-RPC tools/call requests with no authentication, session, origin, or token check, and dispatches them directly to the orchestrator's tool registry. The default bind address is 0.0.0.0. As a result, any party with network reachability to the service can enumerate and invoke privileged management tools. This vulnerability is fixed in 5.1.3.
Published: 2026-05-11
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The MCP HTTP transport in Network‑AI allows JSON‑RPC tool requests to be forwarded to the orchestrator without any form of authentication, session validation, origin check, or token verification. Consequently, an unauthenticated user can invoke operatives that are normally protected, potentially taking full control of the orchestration environment. This flaw is a classic authentication bypass (CWE‑306) that could enable arbitrary privileged operations and compromise confidentiality, integrity, and availability of the orchestrator and the systems it manages.

Affected Systems

Products affected are the Jovancoding Network‑AI orchestrator versions prior to 5.1.3. The vulnerability applies to all network deployments that bind the MCP HTTP endpoint to the default address 0.0.0.0, meaning any host with network access to the service, including internal and external actors, can exploit it.

Risk and Exploitability

The CVSS score of 8.7 classifies this vulnerability as Critical, and it is not listed in the CISA KEV catalog. With no documented exploit workload, the EPSS score is missing, yet the open network exposure and the lack of authentication make the exploitation likelihood high. An attacker with network reachability can freely enumerate available tools and invoke them, effectively bypassing all access controls. Given the severity, an organization should treat this flaw as a high‑priority risk requiring immediate action.

Generated by OpenCVE AI on May 11, 2026 at 19:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Network‑AI version 5.1.3 or later where authentication checks are enforced on the MCP HTTP endpoint
  • Restrict the MCP HTTP service to localhost or to a segmented internal network and block unauthorized IPs at the firewall
  • Configure the orchestrator to require authentication or session validation if continuing to use earlier versions, ensuring that privileged tool calls can only be issued by trusted users

Generated by OpenCVE AI on May 11, 2026 at 19:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-fj4g-2p96-q6m3 Network-AI missing authentication on MCP HTTP endpoint, which allows unauthenticated privileged tool calls
History

Tue, 12 May 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Jovancoding
Jovancoding network-ai
Vendors & Products Jovancoding
Jovancoding network-ai

Mon, 11 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 18:00:00 +0000

Type Values Removed Values Added
Description Network-AI is a TypeScript/Node.js multi-agent orchestrator. Prior to 5.1.3, the MCP HTTP transport accepts JSON-RPC tools/call requests with no authentication, session, origin, or token check, and dispatches them directly to the orchestrator's tool registry. The default bind address is 0.0.0.0. As a result, any party with network reachability to the service can enumerate and invoke privileged management tools. This vulnerability is fixed in 5.1.3.
Title Network-AI: Missing authentication on MCP HTTP endpoint allows unauthenticated privileged tool calls
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Jovancoding Network-ai
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-11T18:33:59.839Z

Reserved: 2026-04-30T16:44:48.379Z

Link: CVE-2026-42856

cve-icon Vulnrichment

Updated: 2026-05-11T18:33:51.648Z

cve-icon NVD

Status : Received

Published: 2026-05-11T18:16:35.990

Modified: 2026-05-11T20:25:42.997

Link: CVE-2026-42856

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T09:22:44Z

Weaknesses