CVE-2025-5276: Server-Side Request Forgery (SSRF) in mcp-markdownify-server
All versions of the package mcp-markdownify-server are vulnerable to Server-Side Request Forgery (SSRF) via the Markdownify.get() function. An attacker can craft a prompt that, once accessed by the MCP host, can invoke the webpage-to-markdown, bing-search-to-markdown, and youtube-to-markdown tools to issue requests and read the responses to attacker-controlled URLs, potentially leaking sensitive information.
AI Analysis
Technical Summary
CVE-2025-5276 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting all versions of the mcp-markdownify-server package. The vulnerability resides in the Markdownify.get() function, which is designed to convert various web content formats (such as webpages, Bing search results, and YouTube content) into markdown format. An attacker can exploit this flaw by crafting a malicious prompt that, when processed by the MCP host, triggers the invocation of these tools to issue HTTP requests to attacker-controlled URLs. This allows the attacker to read the responses from these URLs, effectively enabling them to make the server perform arbitrary HTTP requests and potentially access internal or sensitive resources that are not directly accessible from the outside. The vulnerability is notable for requiring no privileges or authentication (AV:N/PR:N), but it does require user interaction (UI:A), meaning the attacker must trick a user or system component into processing the malicious prompt. The CVSS 4.0 score of 8.2 reflects the high impact on confidentiality due to potential data leakage, with a high scope and complexity. The vulnerability does not appear to have known exploits in the wild yet, and no patches have been published at the time of disclosure. The CWE classification CWE-918 confirms this as an SSRF issue. This vulnerability can be leveraged to bypass network access controls, access internal services, or exfiltrate sensitive information from the server environment by abusing the markdown conversion tools' ability to fetch external content.
Potential Impact
For European organizations, the impact of this SSRF vulnerability can be significant, especially for those using the mcp-markdownify-server package in their infrastructure or applications. The ability to perform SSRF attacks can lead to unauthorized access to internal systems, including databases, internal APIs, or cloud metadata services, potentially resulting in data breaches or lateral movement within the network. Confidential information could be exposed, including sensitive business data or personal data protected under GDPR. Additionally, attackers might use this vulnerability to pivot attacks or conduct reconnaissance on internal network topology. Given the high CVSS score and the lack of required privileges, the vulnerability poses a substantial risk to organizations that integrate this package into their web services, content management systems, or automation pipelines. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. The absence of patches means organizations must rely on mitigation until an official fix is released, increasing exposure time.
Mitigation Recommendations
European organizations should immediately audit their use of the mcp-markdownify-server package and identify any systems where it is deployed. Until patches are available, organizations should implement strict input validation and sanitization on any user-supplied data that could be processed by Markdownify.get(), effectively blocking malicious prompts that attempt to invoke external requests. Network-level controls should be enforced to restrict outbound HTTP requests from servers running this package, limiting them to only trusted destinations. Employing web application firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting markdown conversion endpoints can provide additional protection. Monitoring and logging outbound requests from these servers can help detect suspicious activity early. Organizations should also educate users and administrators about the risk of processing untrusted markdown prompts to reduce the likelihood of successful social engineering. Finally, organizations should track vendor updates closely and apply patches as soon as they become available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-5276: Server-Side Request Forgery (SSRF) in mcp-markdownify-server
Description
All versions of the package mcp-markdownify-server are vulnerable to Server-Side Request Forgery (SSRF) via the Markdownify.get() function. An attacker can craft a prompt that, once accessed by the MCP host, can invoke the webpage-to-markdown, bing-search-to-markdown, and youtube-to-markdown tools to issue requests and read the responses to attacker-controlled URLs, potentially leaking sensitive information.
AI-Powered Analysis
Technical Analysis
CVE-2025-5276 is a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting all versions of the mcp-markdownify-server package. The vulnerability resides in the Markdownify.get() function, which is designed to convert various web content formats (such as webpages, Bing search results, and YouTube content) into markdown format. An attacker can exploit this flaw by crafting a malicious prompt that, when processed by the MCP host, triggers the invocation of these tools to issue HTTP requests to attacker-controlled URLs. This allows the attacker to read the responses from these URLs, effectively enabling them to make the server perform arbitrary HTTP requests and potentially access internal or sensitive resources that are not directly accessible from the outside. The vulnerability is notable for requiring no privileges or authentication (AV:N/PR:N), but it does require user interaction (UI:A), meaning the attacker must trick a user or system component into processing the malicious prompt. The CVSS 4.0 score of 8.2 reflects the high impact on confidentiality due to potential data leakage, with a high scope and complexity. The vulnerability does not appear to have known exploits in the wild yet, and no patches have been published at the time of disclosure. The CWE classification CWE-918 confirms this as an SSRF issue. This vulnerability can be leveraged to bypass network access controls, access internal services, or exfiltrate sensitive information from the server environment by abusing the markdown conversion tools' ability to fetch external content.
Potential Impact
For European organizations, the impact of this SSRF vulnerability can be significant, especially for those using the mcp-markdownify-server package in their infrastructure or applications. The ability to perform SSRF attacks can lead to unauthorized access to internal systems, including databases, internal APIs, or cloud metadata services, potentially resulting in data breaches or lateral movement within the network. Confidential information could be exposed, including sensitive business data or personal data protected under GDPR. Additionally, attackers might use this vulnerability to pivot attacks or conduct reconnaissance on internal network topology. Given the high CVSS score and the lack of required privileges, the vulnerability poses a substantial risk to organizations that integrate this package into their web services, content management systems, or automation pipelines. The requirement for user interaction means phishing or social engineering could be used to trigger the exploit, increasing the attack surface. The absence of patches means organizations must rely on mitigation until an official fix is released, increasing exposure time.
Mitigation Recommendations
European organizations should immediately audit their use of the mcp-markdownify-server package and identify any systems where it is deployed. Until patches are available, organizations should implement strict input validation and sanitization on any user-supplied data that could be processed by Markdownify.get(), effectively blocking malicious prompts that attempt to invoke external requests. Network-level controls should be enforced to restrict outbound HTTP requests from servers running this package, limiting them to only trusted destinations. Employing web application firewalls (WAFs) with custom rules to detect and block SSRF patterns targeting markdown conversion endpoints can provide additional protection. Monitoring and logging outbound requests from these servers can help detect suspicious activity early. Organizations should also educate users and administrators about the risk of processing untrusted markdown prompts to reduce the likelihood of successful social engineering. Finally, organizations should track vendor updates closely and apply patches as soon as they become available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- snyk
- Date Reserved
- 2025-05-27T14:00:31.881Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6837ecfc182aa0cae26d541e
Added to database: 5/29/2025, 5:13:32 AM
Last enriched: 7/7/2025, 4:56:18 AM
Last updated: 8/7/2025, 10:19:53 PM
Views: 518
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.