Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27826: CWE-918: Server-Side Request Forgery (SSRF) in sooperset mcp-atlassian

0
High
VulnerabilityCVE-2026-27826cvecve-2026-27826cwe-918
Published: Tue Mar 10 2026 (03/10/2026, 18:46:12 UTC)
Source: CVE Database V5
Vendor/Project: sooperset
Product: mcp-atlassian

Description

CVE-2026-27826 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in sooperset's mcp-atlassian server versions prior to 0. 17. 0. It allows unauthenticated attackers who can access the HTTP endpoint to force the server to make arbitrary outbound HTTP requests by supplying two custom headers without needing an Authorization header. This vulnerability resides in the HTTP middleware and dependency injection layer, bypassing tool-level code detection. In cloud environments, it can lead to theft of IAM role credentials via the instance metadata service. In any deployment, it enables internal network reconnaissance and injection of attacker-controlled content into LLM tool results. The issue is fixed in version 0. 17. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/17/2026, 19:28:05 UTC

Technical Analysis

CVE-2026-27826 is a Server-Side Request Forgery (SSRF) vulnerability affecting sooperset's mcp-atlassian server, a Model Context Protocol server used with Atlassian products such as Confluence and Jira. The vulnerability exists in versions prior to 0.17.0 and allows an unauthenticated attacker with network access to the mcp-atlassian HTTP endpoint to coerce the server into making arbitrary HTTP requests to attacker-controlled URLs. This is achieved by sending two specially crafted HTTP headers without an Authorization header. The flaw lies in the HTTP middleware and dependency injection layer rather than in the MCP tool handlers, making it invisible to typical tool-level code analysis. In cloud deployments, this SSRF can be leveraged to access the instance metadata endpoint (169.254.169.254), potentially leading to theft of IAM role credentials, which could allow privilege escalation and lateral movement within cloud environments. In any deployment, the vulnerability enables internal network reconnaissance by probing internal services and injecting malicious content into responses used by large language model (LLM) tools, potentially poisoning their outputs. The vulnerability does not require authentication or user interaction, increasing its risk. The issue was publicly disclosed on March 10, 2026, with a CVSS 3.1 score of 8.2, reflecting high impact on confidentiality and partial impact on integrity, with no impact on availability. The vulnerability is fixed in version 0.17.0 of mcp-atlassian.

Potential Impact

The primary impact of CVE-2026-27826 is the unauthorized ability for attackers to make the vulnerable server perform arbitrary HTTP requests, which can lead to significant security breaches. In cloud environments, attackers can exploit this SSRF to access the instance metadata service, potentially stealing IAM credentials that grant elevated privileges, enabling further compromise of cloud infrastructure and data exfiltration. In on-premises or private network deployments, the vulnerability facilitates internal network reconnaissance, allowing attackers to map internal services and potentially identify further vulnerabilities. Additionally, attackers can inject malicious content into the responses processed by LLM tools, potentially poisoning outputs and misleading users or automated processes relying on these tools. The lack of authentication and user interaction requirements increases the likelihood of exploitation once network access is obtained. Organizations using Atlassian products integrated with mcp-atlassian servers prior to version 0.17.0 face risks of data confidentiality breaches, integrity violations, and potential lateral movement within their networks. The vulnerability could also undermine trust in LLM-based tools by corrupting their data inputs.

Mitigation Recommendations

Organizations should immediately upgrade all instances of mcp-atlassian to version 0.17.0 or later, where this SSRF vulnerability is fixed. Until upgrades can be applied, network-level mitigations should be implemented: restrict access to the mcp-atlassian HTTP endpoint to trusted internal IP addresses only, using firewalls or network segmentation. Employ egress filtering to prevent unauthorized outbound HTTP requests from the server, especially blocking access to sensitive internal IP ranges such as the cloud instance metadata service (169.254.169.254). Monitor network traffic for unusual outbound requests originating from mcp-atlassian servers. Implement strict input validation and header inspection at the HTTP middleware layer if possible, to detect and block suspicious custom headers that could trigger SSRF. Conduct internal network scans to identify any exposed mcp-atlassian endpoints and remediate accordingly. Review and audit IAM role permissions to minimize the impact of potential credential theft. Finally, monitor logs and LLM tool outputs for signs of injection or poisoning attempts that may indicate exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-24T02:32:39.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b06a2b2f860ef943991eff

Added to database: 3/10/2026, 6:59:55 PM

Last enriched: 3/17/2026, 7:28:05 PM

Last updated: 4/24/2026, 2:23:20 PM

Views: 164

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses