CVE-2026-7221
Received Received - Intake
Server-Side Request Forgery in TencentCloudBase open-url API

Publication date: 2026-04-28

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in TencentCloudBase CloudBase-MCP up to 2.17.0. Affected is the function openUrl of the file mcp/src/interactive-server.ts of the component open-url API Endpoint. The manipulation of the argument req.body.url results in server-side request forgery. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 2.17.1 is able to address this issue. The patch is identified as 3f678a1e7bd400cd76469d61024097d4920dc6b5. It is recommended to upgrade the affected component.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tencentcloud cloudbase-mcp to 2.17.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-918 The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-7221 is a Server-Side Request Forgery (SSRF) vulnerability found in TencentCloudBase CloudBase-MCP up to version 2.17.0. It affects the openUrl function in the file mcp/src/interactive-server.ts, specifically the open-url API endpoint.

The vulnerability arises because the server accepts a user-controlled URL parameter (req.body.url) without proper validation and uses it to make outbound requests. This allows an attacker to coerce the server into making requests to arbitrary internal or external network resources.

The exploit can be launched remotely since the vulnerable endpoint listens on all network interfaces by default (0.0.0.0), exposing it beyond localhost.

The fix involves adding strict URL validation to block unsafe URLs (such as localhost, private IP ranges, link-local addresses, and cloud metadata endpoints), changing the default server binding to localhost (127.0.0.1) to restrict access, and rejecting unsafe requests with HTTP 403 Forbidden.


How can this vulnerability impact me? :

This SSRF vulnerability can impact you by allowing attackers to make the vulnerable server perform unauthorized requests to internal or external network resources.

  • Confidentiality impact: Attackers may access sensitive internal services or metadata endpoints, potentially leaking confidential information.
  • Integrity impact: Attackers can influence outbound requests but cannot directly modify server data, so integrity impact is low.
  • Availability impact: Repeated exploitation could cause resource exhaustion or unwanted behavior, but availability impact is low.

The vulnerability has a CVSS v3.1 base score of 7.3 to 9.3 depending on exposure, indicating a high to critical severity if the server is exposed to untrusted networks.

If the vulnerable server is exposed to untrusted networks without authentication or URL validation, attackers can exploit this remotely to access internal systems or cause other security issues.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the vulnerable CloudBase-MCP server is exposing the /api/open-url HTTP POST endpoint without URL validation or access restrictions.

One practical detection method is to send a crafted POST request to the /api/open-url endpoint with a URL parameter pointing to a controlled listener and observe if the server makes an outbound request.

Example command using curl to test if the server opens a URL without validation:

  • curl -X POST http://<target-host>:<port>/api/open-url -H "Content-Type: application/json" -d '{"url":"http://127.0.0.1:8765/"}'

If the server responds with success and the attacker-controlled listener receives a request, it confirms the vulnerability.

Additionally, verify the server's binding address. If it is bound to 0.0.0.0 (all interfaces), it is more exposed and vulnerable to remote exploitation.

Checking the version of CloudBase-MCP is also important, as versions up to 2.17.0 are vulnerable.


What immediate steps should I take to mitigate this vulnerability?

The primary immediate mitigation is to upgrade CloudBase-MCP to version 2.17.1 or later, which includes the patch that enforces strict URL validation and restricts server binding.

If upgrading immediately is not possible, apply the following mitigations:

  • Restrict the server binding address by setting the environment variable INTERACTIVE_SERVER_HOST=127.0.0.1 to limit access to localhost only.
  • Avoid exposing or port-forwarding the interactive server to untrusted networks.
  • Implement authentication and authorization controls on the /api/open-url endpoint to prevent unauthorized access.
  • Manually review and enforce URL allowlists or validation to block unsafe URLs, including loopback, link-local, private IP ranges, and cloud metadata endpoints.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-7221 is a Server-Side Request Forgery (SSRF) issue that allows an attacker to make the affected server send unauthorized requests to internal or external systems. This can lead to potential leakage of sensitive information, which impacts confidentiality.

Since the vulnerability can expose internal network resources and potentially sensitive data, it may affect compliance with data protection regulations such as GDPR and HIPAA, which require safeguarding personal and sensitive information against unauthorized access or disclosure.

Organizations using the affected TencentCloudBase CloudBase-MCP component should consider this vulnerability a risk to their compliance posture, especially if the server is exposed to untrusted networks without proper access controls, authentication, or URL validation.

Mitigations such as restricting server binding to localhost, implementing strict URL validation, and enforcing authentication can help reduce the risk and support compliance with these standards.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart