Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
6.8
Unsecured OAuth Consent Form Opens ChatGPT to Browser Attacks
CVE-2026-32112
GHSA-pf93-j98v-25pv
Summary
ChatGPT's beta OAuth mode is vulnerable to a cross-site scripting (XSS) attack if an attacker tricks the server operator into visiting a malicious URL. This is because the OAuth consent form doesn't properly filter out harmful code from user-controlled parameters. To stay safe, server operators should not use the beta OAuth mode and keep their software up to date.
What to do
- Update ha-mcp to version 7.0.0.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| – | ha-mcp | <= 7.0.0 | 7.0.0 |
Original title
ha-mcp has XSS via Unescaped HTML in OAuth Consent Form
Original description
### Summary
The ha-mcp OAuth consent form renders user-controlled parameters via Python f-strings with no HTML escaping. An attacker who can reach the OAuth endpoint and convince the server operator to follow a crafted authorization URL could execute JavaScript in the operator's browser. This affects only users running the beta OAuth mode (`ha-mcp-oauth`), which is not part of the standard setup and requires explicit configuration.
### Details
**Unescaped f-string rendering**
`consent_form.py` builds HTML using Python f-strings. No call to `html.escape()` exists anywhere in the file. The following values are rendered unescaped:
- `client_name` / `client_id` — in HTML element context (lines 299, 303)
- `client_id`, `redirect_uri`, `state` — in HTML attribute context (lines 310–312), where a `"` character breaks out of `value=""`
- `error_message`, `error`, `error_description` — in error display paths (lines 36–40, 496–497)
An attacker can register a client with a malicious `client_name` via the `/register` (DCR) endpoint, which accepts `client_name` without sanitization. If the server operator then visits a crafted authorization URL for that client, the payload executes in their browser.
**Open Dynamic Client Registration**
DCR is enabled by default with no initial access token required. This is intentional: Claude.ai and ChatGPT must self-register on first use, which is the standard MCP OAuth flow (RFC 7591). Requiring a pre-shared token would break those integrations. Registration alone grants no access — authorization requires an explicit action by the server operator.
### Impact
**Affected configuration:** OAuth mode only (`ha-mcp-oauth`, requires `MCP_BASE_URL`). This mode is in beta and is not included in the main setup documentation. The vast majority of ha-mcp users run stdio mode, which is not affected.
**Attack requirements:**
1. The attacker can reach the ha-mcp OAuth endpoint (it binds to `0.0.0.0` in HTTP mode)
2. The attacker registers a malicious client via `/register`
3. The attacker convinces the **server operator** — the person who set up ha-mcp — to follow a crafted authorization URL for an unrecognized application
Step 3 is a meaningful social engineering bar: the consent form displays the (unfamiliar) application name, and the operator has no legitimate reason to authorize an OAuth client they didn't initiate through Claude.ai or ChatGPT. Normal usage involves being redirected to the consent form from one of those platforms, not from an external link.
If exploited, a JavaScript payload could exfiltrate data entered into the consent form, including the Home Assistant Long-Lived Access Token.
### Fix
Upgrade to 7.0.0
The ha-mcp OAuth consent form renders user-controlled parameters via Python f-strings with no HTML escaping. An attacker who can reach the OAuth endpoint and convince the server operator to follow a crafted authorization URL could execute JavaScript in the operator's browser. This affects only users running the beta OAuth mode (`ha-mcp-oauth`), which is not part of the standard setup and requires explicit configuration.
### Details
**Unescaped f-string rendering**
`consent_form.py` builds HTML using Python f-strings. No call to `html.escape()` exists anywhere in the file. The following values are rendered unescaped:
- `client_name` / `client_id` — in HTML element context (lines 299, 303)
- `client_id`, `redirect_uri`, `state` — in HTML attribute context (lines 310–312), where a `"` character breaks out of `value=""`
- `error_message`, `error`, `error_description` — in error display paths (lines 36–40, 496–497)
An attacker can register a client with a malicious `client_name` via the `/register` (DCR) endpoint, which accepts `client_name` without sanitization. If the server operator then visits a crafted authorization URL for that client, the payload executes in their browser.
**Open Dynamic Client Registration**
DCR is enabled by default with no initial access token required. This is intentional: Claude.ai and ChatGPT must self-register on first use, which is the standard MCP OAuth flow (RFC 7591). Requiring a pre-shared token would break those integrations. Registration alone grants no access — authorization requires an explicit action by the server operator.
### Impact
**Affected configuration:** OAuth mode only (`ha-mcp-oauth`, requires `MCP_BASE_URL`). This mode is in beta and is not included in the main setup documentation. The vast majority of ha-mcp users run stdio mode, which is not affected.
**Attack requirements:**
1. The attacker can reach the ha-mcp OAuth endpoint (it binds to `0.0.0.0` in HTTP mode)
2. The attacker registers a malicious client via `/register`
3. The attacker convinces the **server operator** — the person who set up ha-mcp — to follow a crafted authorization URL for an unrecognized application
Step 3 is a meaningful social engineering bar: the consent form displays the (unfamiliar) application name, and the operator has no legitimate reason to authorize an OAuth client they didn't initiate through Claude.ai or ChatGPT. Normal usage involves being redirected to the consent form from one of those platforms, not from an external link.
If exploited, a JavaScript payload could exfiltrate data entered into the consent form, including the Home Assistant Long-Lived Access Token.
### Fix
Upgrade to 7.0.0
nvd CVSS3.1
6.8
Vulnerability type
CWE-79
Cross-site Scripting (XSS)
Published: 12 Mar 2026 · Updated: 13 Mar 2026 · First seen: 11 Mar 2026