Impact
The flaw originates in the validateUrl function within the Directus-MCP interface, where manipulating the fileUrl argument allows an attacker to force the server to send outbound HTTP requests. This server-side request forgery can expose internal network resources, retrieve sensitive data, or interact with services that should remain inaccessible to external actors, thus threatening confidentiality and potentially availability if the server is abused to conduct further attacks.
Affected Systems
pixelsock's Directus-MCP component in version 1.0.0 is affected. No other versions or products are listed as impacted in the current data.
Risk and Exploitability
The vulnerability carries a CVSS score of 5.3, indicating moderate severity. The EPSS score is unavailable, and it is not included in CISA's KEV catalog. An attacker can initiate the exploit remotely, and the public release of the exploit makes it immediately actionable. The fix is pending acceptance of a pull request, so the risk remains until a stable update is delivered.
OpenCVE Enrichment