Monitor vulnerabilities like this one. Sign up free to get alerted when software you use is affected.
6.9

Atototo API Lab MCP Exposes Server-Side Request Forgery

CVE-2026-5832
Summary

A weakness in Atototo API Lab MCP version 0.2.1 and earlier allows hackers to trick the server into making unauthorized requests. This could be exploited remotely and malicious code has been made available. Affected users should update to the latest version of Atototo API Lab MCP to fix the issue.

Original title
A weakness has been identified in atototo api-lab-mcp up to 0.2.1. This affects the function analyze_api_spec/generate_test_scenarios/test_http_endpoint of the file src/mcp/http-server.ts of the co...
Original description
A weakness has been identified in atototo api-lab-mcp up to 0.2.1. This affects the function analyze_api_spec/generate_test_scenarios/test_http_endpoint of the file src/mcp/http-server.ts of the component HTTP Interface. This manipulation of the argument source/url causes server-side request forgery. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
nvd CVSS2.0 7.5
nvd CVSS3.1 7.3
nvd CVSS4.0 6.9
Vulnerability type
CWE-918 Server-Side Request Forgery (SSRF)
Published: 9 Apr 2026 · Updated: 9 Apr 2026 · First seen: 9 Apr 2026