Submit #785034: imprvhub mcp-browser-agent 0.8.0 Server-Side Request Forgeryinfo

Titleimprvhub mcp-browser-agent 0.8.0 Server-Side Request Forgery
DescriptionThis proof of concept demonstrates a Server-Side Request Forgery (SSRF) vulnerability in the MCP browser agent. The vulnerability resides in the browser_navigate functionality, which allows an attacker to control the url parameter and navigate the browser to arbitrary destinations. By exploiting this flaw, an attacker can force the server to send requests to internal or external systems, potentially exposing sensitive information, accessing restricted resources, or delivering malicious content. This SSRF vulnerability could be leveraged to bypass network restrictions, scan internal networks, or exfiltrate data
Source⚠️ https://github.com/wing3e/public_exp/issues/25
User
 feng kairui (UID 96539)
Submission03/21/2026 11:22 (16 days ago)
Moderation04/05/2026 16:03 (15 days later)
StatusAccepted
VulDB entry355398 [imprvhub mcp-browser-agent up to 0.8.0 URL Parameter src/handlers.ts CallToolRequestSchema request.params.name/request.params.arguments server-side request forgery]
Points20

Do you want to use VulDB in your project?

Use the official API to access entries easily!