CVE-2026-39885

Severity CVSS v4.0:
Pending analysis
Type:
CWE-918 Server-Side Request Forgery (SSRF)
Publication date:
08/04/2026
Last modified:
15/04/2026

Description

FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL restrictions or custom resolvers. A malicious OpenAPI specification containing $ref values pointing to internal network addresses, cloud metadata endpoints, or local files will cause the library to fetch those resources during the initialize() call. This enables Server-Side Request Forgery (SSRF) and local file read attacks when processing untrusted OpenAPI specifications. This vulnerability is fixed in 2.3.0.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:agentfront:\@frontmcp\/adapters:*:*:*:*:*:node.js:*:* 1.0.4 (excluding)
cpe:2.3:a:agentfront:\@frontmcp\/sdk:*:*:*:*:*:node.js:*:* 1.0.4 (excluding)
cpe:2.3:a:agentfront:frontmcp:*:*:*:*:*:node.js:*:* 1.0.4 (excluding)
cpe:2.3:a:frontmcp:mcp-from-openapi:*:*:*:*:*:node.js:*:* 2.3.0 (excluding)