Submit #781778: mixelpixx google-search-mcp 0.1.0 Server-Side Request Forgeryinfo

Titelmixelpixx google-search-mcp 0.1.0 Server-Side Request Forgery
BeschreibungA server-side request forgery (SSRF) vulnerability has been identified in google-search-mcp, a project developed by mixelpixx. The application implements MCP (Model Context Protocol) tools that accept user-controlled URL parameters and passes them to outbound HTTP request functions without adequate validation. Specifically, in src/services/content-extractor.service.ts, the extractContent function calls axios.get(url) with a URL that can be influenced by an attacker through the MCP tool interface. The application fails to implement a destination allowlist or block dangerous network ranges, allowing an attacker to make arbitrary HTTP requests from the server's network context. This enables probing of internal network resources, access to cloud instance metadata services (such as AWS's x.x.x.x), and interaction with other internal systems not intended to be exposed. The vulnerability exists because user-supplied input is trusted as the destination for outbound HTTP requests without implementing security controls such as scheme validation, host allowlisting, or blocking of loopback and private network addresses.
Quelle⚠️ https://github.com/wing3e/public_exp/issues/21
Benutzer
 BigW (UID 96422)
Einreichung17.03.2026 14:41 (vor 19 Tagen)
Moderieren03.04.2026 09:29 (17 days later)
StatusAkzeptiert
VulDB Eintrag355074 [mixelpixx Google-Research-MCP Model Context Protocol content-extractor.service.ts extractContent URL erweiterte Rechte]
Punkte20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!