CVE-2026-39885
Description
FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL restrictions or custom resolvers. A malicious OpenAPI specification containing $ref values pointing to internal network addresses, cloud metadata endpoints, or local files will cause the library to fetch those resources during the initialize() call. This enables Server-Side Request Forgery (SSRF) and local file read attacks when processing untrusted OpenAPI specifications. This vulnerability is fixed in 2.3.0.
EPSS (Exploit Prediction Scoring System)
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score Trend (Last 8 Days)
Server-Side Request Forgery (SSRF)
IncompleteCommon Consequences
Applicable Platforms
Frontmcp by Agentfront
cpe:2.3:a:agentfront:frontmcp:*:*:*:*:*:node.js:*:*
\@Frontmcp\/Sdk by Agentfront
cpe:2.3:a:agentfront:\@frontmcp\/sdk:*:*:*:*:*:node.js:*:*
\@Frontmcp\/Adapters by Agentfront
cpe:2.3:a:agentfront:\@frontmcp\/adapters:*:*:*:*:*:node.js:*:*
Mcp-From-Openapi by Frontmcp
cpe:2.3:a:frontmcp:mcp-from-openapi:*:*:*:*:*:node.js:*:*