๐Ÿ” CVE Alert

CVE-2026-7146

HIGH 7.3

AlejandroArciniegas mcp-data-vis HTTP Request server.js axios server-side request forgery

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A security vulnerability has been detected in AlejandroArciniegas mcp-data-vis up to de5a51525a69822290eaee569a1ab447b490746d. Affected by this vulnerability is the function axios of the file src/servers/web-scraper/server.js of the component HTTP Request Handler. Such manipulation leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed publicly and may be used. This product operates on a rolling release basis, ensuring continuous delivery. Consequently, there are no version details for either affected or updated releases. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-918
Vendor alejandroarciniegas
Product mcp-data-vis
Published Apr 27, 2026
Last Updated Apr 27, 2026
Stay Ahead of the Next One

Get instant alerts for alejandroarciniegas mcp-data-vis

Be the first to know when new high vulnerabilities affecting alejandroarciniegas mcp-data-vis are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

AlejandroArciniegas / mcp-data-vis
de5a51525a69822290eaee569a1ab447b490746d

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359745 vuldb.com: https://vuldb.com/vuln/359745/cti vuldb.com: https://vuldb.com/submit/801895 github.com: https://github.com/AlejandroArciniegas/mcp-data-vis/issues/1 github.com: https://github.com/AlejandroArciniegas/mcp-data-vis/

Credits

๐Ÿ” MidA (VulDB User) VulDB CNA Team