NONE · 0

CVE-2026-39313

mcp-framework is a framework for building Model Context Protocol (MCP) servers. In versions 0.2.21 and below, the readRequestBody() function in the HTTP transport concatenates request body chunks into...

Vulnerability Description

mcp-framework is a framework for building Model Context Protocol (MCP) servers. In versions 0.2.21 and below, the readRequestBody() function in the HTTP transport concatenates request body chunks into a string with no size limit. Although a maxMessageSize configuration value exists, it is never enforced in readRequestBody(). A remote unauthenticated attacker can crash any mcp-framework HTTP server by sending a single large POST request to /mcp, causing memory exhaustion and denial of service. This issue has been fixed in version 0.2.22.

Related Weaknesses (CWE)

References

FAQ

What is CVE-2026-39313?

CVE-2026-39313 is a documented vulnerability. mcp-framework is a framework for building Model Context Protocol (MCP) servers. In versions 0.2.21 and below, the readRequestBody() function in the HTTP transport concatenates request body chunks into...

How severe is CVE-2026-39313?

CVSS scoring is not yet available for CVE-2026-39313. Check NVD for updates.

Is there a patch for CVE-2026-39313?

Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.