Impact
A server‑side request forgery (SSRF) flaw exists in the axios function within the HTTP Request Handler of the mcp-data-vis project. The vulnerability permits a remote attacker to craft requests that are executed by the server, enabling the attacker to reach arbitrary URLs, including internal network endpoints. This type of attack can lead to data exfiltration, internal services discovery, or further chain exploitation, impacting integrity and confidentiality of the system. The bug is present in all releases up to commit de5a51525a69822290eaee569a1ab447b490746d, and no fix has yet been reported.
Affected Systems
The affected product is AlejandroArciniegas mcp-data-vis, a web‑scraping component that uses axios in src/servers/web-scraper/server.js. All versions from the repository’s initial commit up to the point where the latest commit de5a51525a69822290eaee569a1ab447b490746d are vulnerable. Because the project follows a rolling release model, version numbers are not defined, and the vulnerability remains present until an explicit update is provided.
Risk and Exploitability
The CVSS base score is 6.9, indicating a medium severity. An EPSS score is not available, so the current exploitation probability cannot be quantified; the vulnerability is not listed in CISA KEV. An attacker who can interact with the web‑scraper endpoint can trigger the SSRF directly, exploiting the unvalidated outgoing request function. No work‑around has been supplied by the vendor, and the issue remains open, so the risk persists until a fix or mitigated deployment is implemented.
OpenCVE Enrichment