Server-Side Request Forgery in AlejandroArciniegas mcp-data-vis Product
CVE-2026-7146
Key Information:
- Vendor
Alejandroarciniegas
- Status
- Vendor
- CVE Published:
- 27 April 2026
Badges
What is CVE-2026-7146?
A security vulnerability has been identified within the mcp-data-vis product by AlejandroArciniegas that exposes the system to server-side request forgery (SSRF). This flaw arises from the handling of HTTP requests in the axios function located in the src/servers/web-scraper/server.js file. Malicious actors can exploit this weakness to initiate requests from the server, potentially leading to data leaks or unauthorized actions. The vulnerability affects all versions up to a specific commit and has been publicly disclosed, making it critical for users to mitigate their risk by reviewing product usage and monitoring for any unauthorized access attempts.
Affected Version(s)
mcp-data-vis de5a51525a69822290eaee569a1ab447b490746d
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
