CVE-2026-5470
Server-Side Request Forgery in Model Context Protocol Handler
Publication date: 2026-04-03
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| mixelpixx | google-research-mcp | From 1e062d7bd887bfe5f6e582b6cc288bb897b35cf2 (exc) |
| research_mcp | From 1e062d7bd887bfe5f6e582b6cc288bb897b35cf2 (exc) | |
| mixelpixx | google-research-mcp | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-918 | The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the extractContent function of the content-extractor.service.ts file within the Model Context Protocol Handler component of the mixelpixx Google-Research-MCP project. It involves manipulation of the URL argument, which leads to a server-side request forgery (SSRF). This means an attacker can remotely cause the server to make unintended requests to other internal or external resources.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to make the server perform unauthorized requests, potentially accessing internal systems or sensitive data that the server can reach but the attacker cannot directly access. This can lead to information disclosure, unauthorized actions, or further exploitation within the network.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to perform server-side request forgery (SSRF), potentially accessing internal services and sensitive data within the affected system's network context.
Such unauthorized access to internal resources and data could lead to breaches of confidentiality, which may impact compliance with data protection regulations like GDPR and HIPAA that require safeguarding personal and sensitive information.
However, the provided information does not explicitly discuss compliance impacts or specific regulatory considerations.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring outbound HTTP requests initiated by the server, especially those triggered by user-controlled URL parameters. Verification involves observing if the server makes unexpected outbound connections to internal or attacker-specified addresses.
A proof of concept involves sending a JSON-RPC request to the vulnerable endpoint with a crafted URL parameter and then monitoring outbound traffic to confirm if the server initiates a request to that URL.
Suggested commands to detect this behavior include network traffic monitoring tools such as:
- Using tcpdump or tshark to capture outbound HTTP requests: tcpdump -i <interface> 'tcp port 80 or tcp port 443'
- Using netstat or ss to check active outbound connections: netstat -tnp | grep <process_name> or ss -tnp | grep <process_name>
- Using curl or similar tools to test the vulnerable endpoint by sending crafted JSON-RPC requests and observing server behavior.
Additionally, enabling detailed request logging on the server to capture and analyze incoming requests and their parameters can help identify exploitation attempts.
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include enforcing strict destination allowlists for all outbound requests made by the vulnerable component.
- Block requests to loopback, link-local, RFC1918 private IP ranges, and cloud metadata IP ranges after DNS resolution.
- Implement strict schema validation and input hardening on all user-controlled URL parameters.
- Require authentication and authorization for all high-risk tools and endpoints to prevent unauthorized access.
- Introduce request logging, alerting, and rate limiting to detect and prevent abuse.
- Centralize outbound request policy enforcement to deny unsafe destinations by default.
These steps help reduce the risk of server-side request forgery exploitation until a patch or update is available.