Impact
The vulnerability lies in the _validate_url_safe function of the mcp-url-downloader project, enabling an attacker to supply a crafted URL that causes the server to make arbitrary HTTP requests on the attacker’s behalf. This server‑side request forgery can lead to exposure of internal resources, execution of unintended operations, and potential compromise of sensitive systems. The flaw is identified as CWE‑918 and is rated moderate with a CVSS score of 6.9. The exploitation requires only remote access to the application and can affect any system that runs the vulnerable code.
Affected Systems
The affected package is dmitryglhf mcp-url-downloader. Versions up to the commit 4b8cf2de55f6e8864a77d108e8a94a5b8e4394c6 are vulnerable. The project follows a rolling‑release model, so exact version numbers for patched releases are not publicly documented; users should check the repository for the latest commit when applying a fix.
Risk and Exploitability
The publicly disclosed exploit is available, and the vulnerability can be triggered remotely. The EPSS score is not available, but the CVSS score of 6.9 indicates a medium severity. The vulnerability is not listed in the CISA KEV catalog. Attackers can target the service through normal traffic channels, making the attack vector likely remote and accessible to anyone who can reach the application. Because no official patch is currently published, the risk is higher for deployments that have not migrated to the latest commit.
OpenCVE Enrichment
Github GHSA