Skip to main content

CVE-2025-5276: Server-Side Request Forgery (SSRF) in mcp-markdownify-server

High
VulnerabilityCVE-2025-5276cvecve-2025-5276
Published: Thu May 29 2025 (05/29/2025, 05:00:05 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: mcp-markdownify-server

Description

All versions of the package mcp-markdownify-server are vulnerable to Server-Side Request Forgery (SSRF) via the Markdownify.get() function. An attacker can craft a prompt that, once accessed by the MCP host, can invoke the webpage-to-markdown, bing-search-to-markdown, and youtube-to-markdown tools to issue requests and read the responses to attacker-controlled URLs, potentially leaking sensitive information.

AI-Powered Analysis

AILast updated: 07/07/2025, 04:56:18 UTC

Technical Analysis

CVE-2025-5276 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting all versions of the mcp-markdownify-server package. The vulnerability resides in the Markdownify.get() function, which is designed to convert various web content formats (such as webpages, Bing search results, and YouTube content) into markdown format. An attacker can exploit this flaw by crafting a malicious prompt that, when processed by the MCP host, triggers the invocation of these tools to issue HTTP requests to attacker-controlled URLs. This allows the attacker to read the responses from these URLs, effectively enabling them to make the server perform arbitrary HTTP requests and potentially access internal or sensitive resources that are not directly accessible from the outside. The vulnerability is notable for requiring no privileges or authentication (AV:N/PR:N), but it does require user interaction (UI:A), meaning the attacker must trick a user or system component into processing the malicious prompt. The CVSS 4.0 score of 8.2 reflects the high impact on confidentiality due to potential data leakage, with a high scope and complexity. The vulnerability does not appear to have known exploits in the wild yet, and no patches have been published at the time of disclosure. The CWE classification CWE-918 confirms this as an SSRF issue. This vulnerability can be leveraged to bypass network access controls, access internal services, or exfiltrate sensitive information from the server environment by abusing the markdown conversion tools' ability to fetch external content.

Potential Impact

For European organizations, the impact of this SSRF vulnerability can be significant, especially for those using the mcp-markdownify-server package in their infrastructure or applications. The ability to perform SSRF attacks can lead to unauthorized access to internal systems, including databases, internal APIs, or cloud metadata services, potentially resulting in data breaches or lateral movement within the network. Confidential information could be exposed, including sensitive business data or personal data protected under GDPR. Additionally, attackers might use this vulnerability to pivot attacks or conduct reconnaissance on internal network topology. Given the high CVSS score and the lack of required privileges, the vulnerability poses a substantial risk to organizations that integrate this package into their web services, content management systems, or automation pipelines. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. The absence of patches means organizations must rely on mitigation until an official fix is released, increasing exposure time.

Mitigation Recommendations

European organizations should immediately audit their use of the mcp-markdownify-server package and identify any systems where it is deployed. Until patches are available, organizations should implement strict input validation and sanitization on any user-supplied data that could be processed by Markdownify.get(), effectively blocking malicious prompts that attempt to invoke external requests. Network-level controls should be enforced to restrict outbound HTTP requests from servers running this package, limiting them to only trusted destinations. Employing web application firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting markdown conversion endpoints can provide additional protection. Monitoring and logging outbound requests from these servers can help detect suspicious activity early. Organizations should also educate users and administrators about the risk of processing untrusted markdown prompts to reduce the likelihood of successful social engineering. Finally, organizations should track vendor updates closely and apply patches as soon as they become available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
snyk
Date Reserved
2025-05-27T14:00:31.881Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6837ecfc182aa0cae26d541e

Added to database: 5/29/2025, 5:13:32 AM

Last enriched: 7/7/2025, 4:56:18 AM

Last updated: 8/7/2025, 10:19:53 PM

Views: 518

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats