NVD Vulnerability Detail
Search Exploit, PoC
CVE-2026-39885
Summary

FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL restrictions or custom resolvers. A malicious OpenAPI specification containing $ref values pointing to internal network addresses, cloud metadata endpoints, or local files will cause the library to fetch those resources during the initialize() call. This enables Server-Side Request Forgery (SSRF) and local file read attacks when processing untrusted OpenAPI specifications. This vulnerability is fixed in 2.3.0.

Publication Date April 9, 2026, 6:17 a.m.
Registration Date April 15, 2026, 11:32 a.m.
Last Update April 16, 2026, 4:04 a.m.
CVSS3.1 : HIGH
スコア 7.5
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C)
完全性への影響(I) なし
可用性への影響(A) なし
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:agentfront:\@frontmcp\/adapters:*:*:*:*:*:node.js:*:* 1.0.4
cpe:2.3:a:agentfront:\@frontmcp\/sdk:*:*:*:*:*:node.js:*:* 1.0.4
cpe:2.3:a:agentfront:frontmcp:*:*:*:*:*:node.js:*:* 1.0.4
cpe:2.3:a:frontmcp:mcp-from-openapi:*:*:*:*:*:node.js:*:* 2.3.0
Related information, measures and tools
Common Vulnerabilities List