Impact
The vulnerability originates from improper handling of the source/url parameter in the HTTP Interface of the atototo api‑lab‑mcp component. An attacker can supply an arbitrary URL, causing the server to perform an HTTP request on the attacker's behalf. This server‑side request forgery allows the application to reach destinations that may otherwise be inaccessible, potentially revealing internal resources or exposing user data. The weakness is identified as CWE‑918.
Affected Systems
Affected versions of the atototo api‑lab‑mcp component are 0.0.1 through 0.2.1 inclusive. Any deployment using these releases is susceptible. Updated releases beyond 0.2.1 are not listed as vulnerable in the available information.
Risk and Exploitability
The CVSS v3.1 score of 6.9 indicates a medium severity vulnerability. EPSS data is not provided, and the CVE is not cataloged in the KEV list. The description explicitly states that the attack can be carried out remotely, and public exploit code has been released, suggesting potential exploitation against exposed instances.
OpenCVE Enrichment