๐Ÿ” CVE Alert

CVE-2026-44429

UNKNOWN 0.0

MCP Registry: Stored XSS in catalogue UI via attribute-quote breakout in publisher-controlled `websiteUrl`

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

The MCP Registry provides MCP clients with a list of MCP servers, like an app store for MCP servers. Prior to 1.7.7, the public catalogue UI served at GET / (file internal/api/handlers/v0/ui_index.html) is vulnerable to stored cross-site scripting via the server.websiteUrl field of any published server.json. Server-side validation in internal/validators/validators.go (validateWebsiteURL) only checks that the URL parses, is absolute, and uses the https scheme; it does not reject quote characters. Client-side, the value is interpolated into a double-quoted href attribute via innerHTML, using a homegrown escapeHtml helper that performs the standard textContent โ†’ innerHTML round-trip. Per the HTML serialisation algorithm, that round-trip encodes only &, <, > and U+00A0 inside text nodes โ€” it does not encode " or '. A literal " in websiteUrl therefore breaks out of the href attribute, allowing arbitrary on* event handlers to be appended to the same <a> element. The Content-Security-Policy on / is script-src 'self' 'unsafe-inline' https://cdn.tailwindcss.com, so the injected event handlers execute. Any user able to obtain a publish token (e.g. via POST /v0/auth/github-at with their own GitHub account, or POST /v0/auth/none on a deployment that has anonymous auth enabled) can plant a poisoned record visible to every visitor of the registry homepage. This vulnerability is fixed in 1.7.7.

CWE CWE-79 CWE-116
Vendor modelcontextprotocol
Product registry
Published May 14, 2026
Stay Ahead of the Next One

Get instant alerts for modelcontextprotocol registry

Be the first to know when new unknown vulnerabilities affecting modelcontextprotocol registry are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

modelcontextprotocol / registry
< 1.7.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/modelcontextprotocol/registry/security/advisories/GHSA-rqv2-m695-f8j4