๐Ÿ” CVE Alert

CVE-2026-32871

UNKNOWN 0.0

FastMCP OpenAPI Provider has an SSRF & Path Traversal Vulnerability

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

FastMCP is a Pythonic way to build MCP servers and clients. Prior to version 3.2.0, the OpenAPIProvider in FastMCP exposes internal APIs to MCP clients by parsing OpenAPI specifications. The RequestDirector class is responsible for constructing HTTP requests to the backend service. A vulnerability exists in the _build_url() method. When an OpenAPI operation defines path parameters (e.g., /api/v1/users/{user_id}), the system directly substitutes parameter values into the URL template string without URL-encoding. Subsequently, urllib.parse.urljoin() resolves the final URL. Since urljoin() interprets ../ sequences as directory traversal, an attacker controlling a path parameter can perform path traversal attacks to escape the intended API prefix and access arbitrary backend endpoints. This results in authenticated SSRF, as requests are sent with the authorization headers configured in the MCP provider. This issue has been patched in version 3.2.0.

CWE CWE-918
Vendor prefecthq
Product fastmcp
Published Apr 2, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for prefecthq fastmcp

Be the first to know when new unknown vulnerabilities affecting prefecthq fastmcp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

PrefectHQ / fastmcp
< 3.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/PrefectHQ/fastmcp/security/advisories/GHSA-vv7q-7jx5-f767 github.com: https://github.com/PrefectHQ/fastmcp/pull/3507 github.com: https://github.com/PrefectHQ/fastmcp/commit/40bdfb6b1de0ce30609ee9ba5bb95ecd04a9fb71 github.com: https://github.com/PrefectHQ/fastmcp/releases/tag/v3.2.0