๐Ÿ” CVE Alert

CVE-2026-42260

HIGH 8.2

Open-WebSearch: SSRF in `fetchWebContent` MCP tool: bracketed IPv6 literals and non-resolving hostname check bypass `isPrivateOrLocalHostname`

CVSS Score
8.2
EPSS Score
0.0%
EPSS Percentile
0th

Open-WebSearch is a multi-engine MCP server, CLI, and local daemon for agent web search and content retrieval. Prior to 2.1.7, isPublicHttpUrl / assertPublicHttpUrl in src/utils/urlSafety.ts do not recognize bracketed IPv6 literals and do not resolve DNS, which combine to allow non-blind SSRF with the response body returned to the caller. This vulnerability is fixed in 2.1.7.

CWE CWE-918
Vendor aas-ee
Product open-websearch
Published May 12, 2026
Stay Ahead of the Next One

Get instant alerts for aas-ee open-websearch

Be the first to know when new high vulnerabilities affecting aas-ee open-websearch are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

Aas-ee / open-webSearch
< 2.1.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Aas-ee/open-webSearch/security/advisories/GHSA-v228-72c7-fx8j