Vulnerability Description
A vulnerability was found in TencentCloudBase CloudBase-MCP up to 2.17.0. Affected is the function openUrl of the file mcp/src/interactive-server.ts of the component open-url API Endpoint. The manipulation of the argument req.body.url results in server-side request forgery. It is possible to launch the attack remotely. The exploit has been made public and could be used. Upgrading to version 2.17.1 is able to address this issue. The patch is identified as 3f678a1e7bd400cd76469d61024097d4920dc6b5. It is recommended to upgrade the affected component.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/TencentCloudBase/CloudBase-MCP/
- https://github.com/TencentCloudBase/CloudBase-MCP/commit/3f678a1e7bd400cd76469d6
- https://github.com/TencentCloudBase/CloudBase-MCP/issues/509
- https://github.com/TencentCloudBase/CloudBase-MCP/pull/510
- https://github.com/TencentCloudBase/CloudBase-MCP/releases/tag/v2.17.1
- https://vuldb.com/submit/802230
- https://vuldb.com/vuln/359821
- https://vuldb.com/vuln/359821/cti
FAQ
What is CVE-2026-7221?
CVE-2026-7221 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was found in TencentCloudBase CloudBase-MCP up to 2.17.0. Affected is the function openUrl of the file mcp/src/interactive-server.ts of the component open-url API Endpoint. The manipul...
How severe is CVE-2026-7221?
CVE-2026-7221 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7221?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.