๐Ÿ” CVE Alert

CVE-2026-7158

HIGH 7.3

dmitryglhf mcp-url-downloader server.py _validate_url_safe server-side request forgery

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability has been found in dmitryglhf mcp-url-downloader up to 4b8cf2de55f6e8864a77d108e8a94a5b8e4394c6. Affected by this issue is the function _validate_url_safe of the file src/mcp_url_downloader/server.py. Such manipulation of the argument url leads to server-side request forgery. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-918
Vendor dmitryglhf
Product mcp-url-downloader
Published Apr 27, 2026
Stay Ahead of the Next One

Get instant alerts for dmitryglhf mcp-url-downloader

Be the first to know when new high vulnerabilities affecting dmitryglhf mcp-url-downloader are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

dmitryglhf / mcp-url-downloader
4b8cf2de55f6e8864a77d108e8a94a5b8e4394c6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359757 vuldb.com: https://vuldb.com/vuln/359757/cti vuldb.com: https://vuldb.com/submit/802062 github.com: https://github.com/dmitryglhf/url-download-mcp/issues/2

Credits

๐Ÿ” SmallW (VulDB User) VulDB CNA Team