Impact
The flaw resides in the CallToolRequestSchema function of the URL Parameter Handler in the imprvhub mcp‑browser‑agent. By altering the request parameters "name" and "arguments", an attacker can cause the server to issue arbitrary outbound HTTP requests. This Server‑Side Request Forgery allows a remote actor to reach private networks, exfiltrate data, or redirect traffic to malicious destinations, all without authentication.
Affected Systems
All copies of imprvhub mcp‑browser‑agent up to version 0.8.0 are susceptible. The specific impact is limited to the component that processes URL parameters and forwards requests, but the reach of forged requests can cross organizational boundaries.
Risk and Exploitability
The CVSS base score of 5.3 indicates moderate severity. The exploit is publicly disclosed and can be executed remotely by sending crafted parameters; no authentication or privileged access is required. EPSS data is absent, and the flaw is not listed in the CISA KEV catalog, yet the availability of a public exploit and the remote nature of the attack keep the risk notable.
OpenCVE Enrichment