Vulnerability Description
Network-AI is a TypeScript/Node.js multi-agent orchestrator. Prior to 5.1.3, the MCP HTTP transport accepts JSON-RPC tools/call requests with no authentication, session, origin, or token check, and dispatches them directly to the orchestrator's tool registry. The default bind address is 0.0.0.0. As a result, any party with network reachability to the service can enumerate and invoke privileged management tools. This vulnerability is fixed in 5.1.3.
Related Weaknesses (CWE)
References
- https://github.com/Jovancoding/Network-AI/security/advisories/GHSA-fj4g-2p96-q6m
- https://github.com/Jovancoding/Network-AI/security/advisories/GHSA-fj4g-2p96-q6m
FAQ
What is CVE-2026-42856?
CVE-2026-42856 is a documented vulnerability. Network-AI is a TypeScript/Node.js multi-agent orchestrator. Prior to 5.1.3, the MCP HTTP transport accepts JSON-RPC tools/call requests with no authentication, session, origin, or token check, and di...
How severe is CVE-2026-42856?
CVSS scoring is not yet available for CVE-2026-42856. Check NVD for updates.
Is there a patch for CVE-2026-42856?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.