Stored Cross-Site Scripting in MCP Registry by Model Context Protocol
CVE-2026-44429
5.1MEDIUM
What is CVE-2026-44429?
The MCP Registry is prone to a stored cross-site scripting vulnerability that allows attackers to inject malicious event handlers into the registry homepage. This issue arises from insufficient validation of the 'server.websiteUrl' field in published 'server.json' files. Although the server-side validation checks basic URL structure, it fails to adequately sanitize quotes. Consequently, when the value is included in the HTML output, it can break out of attributes and allow for the execution of arbitrary scripts. Users with publish tokens can exploit this to plant harmful scripts visible to all visitors, making this a significant security risk. This vulnerability has been addressed in MCP Registry version 1.7.7.
Affected Version(s)
registry < 1.7.7
