Impact
The vulnerability lies in the extractContent function of the Model Context Protocol Handler; manipulating the URL argument causes the server to make internal HTTP requests. This represents a server-side request forgery (SSRF) weakness, categorized as CWE-918, allowing a remote attacker to direct the server to query arbitrary URLs, potentially accessing internal resources or exfiltrating sensitive data.
Affected Systems
The affected product is mixelpixx Google‑Research‑MCP. No specific version numbers are available because the project uses a rolling release model, so any release that includes the vulnerable code may be impacted.
Risk and Exploitability
The CVSS score is 5.3, indicating a moderate severity. The EPSS score is not available and the vulnerability is not listed in KEV. Exploitation can be initiated remotely by supplying a crafted URL to the extractContent call, leading the server to send requests to attacker-controlled or internal endpoints. Given the lack of additional constraints, the risk to systems that do not update remains considerable.
OpenCVE Enrichment