Description
A vulnerability was found in dh1011 auto-favicon up to f189116a9259950c2393f114dbcb94dde0ad864b. This issue affects the function generate_favicon_from_url of the file src/auto_favicon/server.py of the component MCP Tool. The manipulation of the argument image_url results in server-side request forgery. The attack may be performed from remote. The exploit has been made public and could be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Patch
AI Analysis

Impact

A flaw in the generate_favicon_from_url function of the auto‑favicon MCP Tool allows an attacker to supply an arbitrary image_url value, causing the server to perform an HTTP request to that address. This server‑side request forgery permits attackers to reach internal network resources, exfiltrate sensitive data, or trigger unintended actions on the target host. The weakness is catalogued as CWE‑918 and can lead to confidentiality or integrity compromise of internal systems.

Affected Systems

The issue affects the dh1011:auto‑favicon project up to commit f189116a9259950c2393f114dbcb94dde0ad864b. Because the project follows a rolling release model and does not publish discrete release identifiers, no specific version numbers are available. Users running the current or any earlier iteration of the MCP Tool should assume the issue is present.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium‑severity risk. EPSS data are unavailable, but the public availability of the exploit indicates real‑world exploitation potential. The vulnerability is not listed in CISA KEV; nevertheless, the remote nature of the SSRF and the existence of a public exploit increase the threat level for any environment that permits untrusted input to generate favicons.

Generated by OpenCVE AI on April 28, 2026 at 19:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Determine if a newer commit or release of auto‑favicon contains a fix; upgrade if available
  • Restrict the image_url parameter to a whitelist of trusted domains or enforce strict input validation to block arbitrary URLs
  • Implement network segmentation or firewall rules that prevent the MCP Tool from accessing sensitive internal hosts and services

Generated by OpenCVE AI on April 28, 2026 at 19:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vmh7-9c7h-2pgg auto-favicon has a Server-Side Request Forgery issue
History

Tue, 28 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Dh1011
Dh1011 auto-favicon
Vendors & Products Dh1011
Dh1011 auto-favicon

Mon, 27 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in dh1011 auto-favicon up to f189116a9259950c2393f114dbcb94dde0ad864b. This issue affects the function generate_favicon_from_url of the file src/auto_favicon/server.py of the component MCP Tool. The manipulation of the argument image_url results in server-side request forgery. The attack may be performed from remote. The exploit has been made public and could be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.
Title dh1011 auto-favicon MCP Tool server.py generate_favicon_from_url server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Dh1011 Auto-favicon
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-28T14:19:17.663Z

Reserved: 2026-04-26T20:03:47.765Z

Link: CVE-2026-7150

cve-icon Vulnrichment

Updated: 2026-04-28T14:19:11.620Z

cve-icon NVD

Status : Deferred

Published: 2026-04-27T19:17:00.040

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7150

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:45:07Z

Weaknesses