Server-Side Request Forgery Vulnerability in mcp-markdownify-server by MCP
CVE-2025-5276

8.2HIGH

Key Information:

Vendor

MCP

Vendor
CVE Published:
29 May 2025

What is CVE-2025-5276?

The mcp-markdownify-server package is susceptible to Server-Side Request Forgery (SSRF) vulnerabilities through its Markdownify.get() function. This flaw allows attackers to craft a specific prompt that enables unauthorized access to webpage-to-markdown, bing-search-to-markdown, and youtube-to-markdown tools. This functionality could inadvertently expose sensitive information by making requests to URLs controlled by an attacker, thus revealing potentially exploitable data.

Affected Version(s)

mcp-markdownify-server 0

References

CVSS V4

Score:
8.2
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Raul Onitza-Klugman (Snyk Security Research)
.
CVE-2025-5276 : Server-Side Request Forgery Vulnerability in mcp-markdownify-server by MCP