Impact
A flaw in the generate_favicon_from_url function of the auto‑favicon MCP Tool allows an attacker to supply an arbitrary image_url value, causing the server to perform an HTTP request to that address. This server‑side request forgery permits attackers to reach internal network resources, exfiltrate sensitive data, or trigger unintended actions on the target host. The weakness is catalogued as CWE‑918 and can lead to confidentiality or integrity compromise of internal systems.
Affected Systems
The issue affects the dh1011:auto‑favicon project up to commit f189116a9259950c2393f114dbcb94dde0ad864b. Because the project follows a rolling release model and does not publish discrete release identifiers, no specific version numbers are available. Users running the current or any earlier iteration of the MCP Tool should assume the issue is present.
Risk and Exploitability
The CVSS score of 5.3 indicates a medium‑severity risk. EPSS data are unavailable, but the public availability of the exploit indicates real‑world exploitation potential. The vulnerability is not listed in CISA KEV; nevertheless, the remote nature of the SSRF and the existence of a public exploit increase the threat level for any environment that permits untrusted input to generate favicons.
OpenCVE Enrichment
Github GHSA