๐Ÿ” CVE Alert

CVE-2026-39885

HIGH 7.5

FrontMCP Affected by SSRF via $ref Dereferencing in Untrusted OpenAPI Specifications

CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
9th

FrontMCP is a TypeScript-first framework for the Model Context Protocol (MCP). Prior to 2.3.0, the mcp-from-openapi library uses @apidevtools/json-schema-ref-parser to dereference $ref pointers in OpenAPI specifications without configuring any URL restrictions or custom resolvers. A malicious OpenAPI specification containing $ref values pointing to internal network addresses, cloud metadata endpoints, or local files will cause the library to fetch those resources during the initialize() call. This enables Server-Side Request Forgery (SSRF) and local file read attacks when processing untrusted OpenAPI specifications. This vulnerability is fixed in 2.3.0.

CWE CWE-918
Vendor agentfront
Product frontmcp
Published Apr 8, 2026
Last Updated Apr 9, 2026
Stay Ahead of the Next One

Get instant alerts for agentfront frontmcp

Be the first to know when new high vulnerabilities affecting agentfront frontmcp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

agentfront / frontmcp
< 1.0.4
@frontmcp / adapters
< 1.0.4
@frontmcp / sdk
< 1.0.4
frontmcp / mcp-from-openapi
< 2.3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/agentfront/frontmcp/security/advisories/GHSA-v6ph-xcq9-qxxj github.com: https://github.com/agentfront/frontmcp/releases/tag/v1.0.4