๐Ÿ” CVE Alert

CVE-2026-44428

UNKNOWN 0.0

MCP Registry: GitHub OIDC tokens replayable across registry deployments due to shared audience

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

The MCP Registry provides MCP clients with a list of MCP servers, like an app store for MCP servers. Prior to 1.7.6, the client-side and server-side GitHub OIDC flow is bound only to a global audience string, not to the specific registry instance being targeted. On the client side, the publisher always appends audience=mcp-registry when requesting the GitHub Actions ID token, regardless of the selected --registry URL. On the server side, the exchange endpoint validates only that same fixed audience and then derives publish permissions directly from repository_owner. As a result, a token legitimately obtained while interacting with one registry deployment remains acceptable to any other deployment that shares the same code and audience string. This vulnerability is fixed in 1.7.6.

CWE CWE-918
Vendor modelcontextprotocol
Product registry
Published May 14, 2026
Stay Ahead of the Next One

Get instant alerts for modelcontextprotocol registry

Be the first to know when new unknown vulnerabilities affecting modelcontextprotocol registry are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

modelcontextprotocol / registry
< 1.7.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/modelcontextprotocol/registry/security/advisories/GHSA-95c3-6vvw-4mrq