CVE-2026-27826: CWE-918: Server-Side Request Forgery (SSRF) in sooperset mcp-atlassian
CVE-2026-27826 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in sooperset's mcp-atlassian server versions prior to 0. 17. 0. It allows unauthenticated attackers who can access the HTTP endpoint to force the server to make arbitrary outbound HTTP requests by supplying two custom headers without needing an Authorization header. This vulnerability resides in the HTTP middleware and dependency injection layer, bypassing tool-level code detection. In cloud environments, it can lead to theft of IAM role credentials via the instance metadata service. In any deployment, it enables internal network reconnaissance and injection of attacker-controlled content into LLM tool results. The issue is fixed in version 0. 17. 0.
AI Analysis
Technical Summary
CVE-2026-27826 is a Server-Side Request Forgery (SSRF) vulnerability affecting sooperset's mcp-atlassian server, a Model Context Protocol server used with Atlassian products such as Confluence and Jira. The vulnerability exists in versions prior to 0.17.0 and allows an unauthenticated attacker with network access to the mcp-atlassian HTTP endpoint to coerce the server into making arbitrary HTTP requests to attacker-controlled URLs. This is achieved by sending two specially crafted HTTP headers without an Authorization header. The flaw lies in the HTTP middleware and dependency injection layer rather than in the MCP tool handlers, making it invisible to typical tool-level code analysis. In cloud deployments, this SSRF can be leveraged to access the instance metadata endpoint (169.254.169.254), potentially leading to theft of IAM role credentials, which could allow privilege escalation and lateral movement within cloud environments. In any deployment, the vulnerability enables internal network reconnaissance by probing internal services and injecting malicious content into responses used by large language model (LLM) tools, potentially poisoning their outputs. The vulnerability does not require authentication or user interaction, increasing its risk. The issue was publicly disclosed on March 10, 2026, with a CVSS 3.1 score of 8.2, reflecting high impact on confidentiality and partial impact on integrity, with no impact on availability. The vulnerability is fixed in version 0.17.0 of mcp-atlassian.
Potential Impact
The primary impact of CVE-2026-27826 is the unauthorized ability for attackers to make the vulnerable server perform arbitrary HTTP requests, which can lead to significant security breaches. In cloud environments, attackers can exploit this SSRF to access the instance metadata service, potentially stealing IAM credentials that grant elevated privileges, enabling further compromise of cloud infrastructure and data exfiltration. In on-premises or private network deployments, the vulnerability facilitates internal network reconnaissance, allowing attackers to map internal services and potentially identify further vulnerabilities. Additionally, attackers can inject malicious content into the responses processed by LLM tools, potentially poisoning outputs and misleading users or automated processes relying on these tools. The lack of authentication and user interaction requirements increases the likelihood of exploitation once network access is obtained. Organizations using Atlassian products integrated with mcp-atlassian servers prior to version 0.17.0 face risks of data confidentiality breaches, integrity violations, and potential lateral movement within their networks. The vulnerability could also undermine trust in LLM-based tools by corrupting their data inputs.
Mitigation Recommendations
Organizations should immediately upgrade all instances of mcp-atlassian to version 0.17.0 or later, where this SSRF vulnerability is fixed. Until upgrades can be applied, network-level mitigations should be implemented: restrict access to the mcp-atlassian HTTP endpoint to trusted internal IP addresses only, using firewalls or network segmentation. Employ egress filtering to prevent unauthorized outbound HTTP requests from the server, especially blocking access to sensitive internal IP ranges such as the cloud instance metadata service (169.254.169.254). Monitor network traffic for unusual outbound requests originating from mcp-atlassian servers. Implement strict input validation and header inspection at the HTTP middleware layer if possible, to detect and block suspicious custom headers that could trigger SSRF. Conduct internal network scans to identify any exposed mcp-atlassian endpoints and remediate accordingly. Review and audit IAM role permissions to minimize the impact of potential credential theft. Finally, monitor logs and LLM tool outputs for signs of injection or poisoning attempts that may indicate exploitation.
Affected Countries
United States, United Kingdom, Germany, Japan, Australia, Canada, France, Netherlands, India, Singapore
CVE-2026-27826: CWE-918: Server-Side Request Forgery (SSRF) in sooperset mcp-atlassian
Description
CVE-2026-27826 is a high-severity Server-Side Request Forgery (SSRF) vulnerability in sooperset's mcp-atlassian server versions prior to 0. 17. 0. It allows unauthenticated attackers who can access the HTTP endpoint to force the server to make arbitrary outbound HTTP requests by supplying two custom headers without needing an Authorization header. This vulnerability resides in the HTTP middleware and dependency injection layer, bypassing tool-level code detection. In cloud environments, it can lead to theft of IAM role credentials via the instance metadata service. In any deployment, it enables internal network reconnaissance and injection of attacker-controlled content into LLM tool results. The issue is fixed in version 0. 17. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27826 is a Server-Side Request Forgery (SSRF) vulnerability affecting sooperset's mcp-atlassian server, a Model Context Protocol server used with Atlassian products such as Confluence and Jira. The vulnerability exists in versions prior to 0.17.0 and allows an unauthenticated attacker with network access to the mcp-atlassian HTTP endpoint to coerce the server into making arbitrary HTTP requests to attacker-controlled URLs. This is achieved by sending two specially crafted HTTP headers without an Authorization header. The flaw lies in the HTTP middleware and dependency injection layer rather than in the MCP tool handlers, making it invisible to typical tool-level code analysis. In cloud deployments, this SSRF can be leveraged to access the instance metadata endpoint (169.254.169.254), potentially leading to theft of IAM role credentials, which could allow privilege escalation and lateral movement within cloud environments. In any deployment, the vulnerability enables internal network reconnaissance by probing internal services and injecting malicious content into responses used by large language model (LLM) tools, potentially poisoning their outputs. The vulnerability does not require authentication or user interaction, increasing its risk. The issue was publicly disclosed on March 10, 2026, with a CVSS 3.1 score of 8.2, reflecting high impact on confidentiality and partial impact on integrity, with no impact on availability. The vulnerability is fixed in version 0.17.0 of mcp-atlassian.
Potential Impact
The primary impact of CVE-2026-27826 is the unauthorized ability for attackers to make the vulnerable server perform arbitrary HTTP requests, which can lead to significant security breaches. In cloud environments, attackers can exploit this SSRF to access the instance metadata service, potentially stealing IAM credentials that grant elevated privileges, enabling further compromise of cloud infrastructure and data exfiltration. In on-premises or private network deployments, the vulnerability facilitates internal network reconnaissance, allowing attackers to map internal services and potentially identify further vulnerabilities. Additionally, attackers can inject malicious content into the responses processed by LLM tools, potentially poisoning outputs and misleading users or automated processes relying on these tools. The lack of authentication and user interaction requirements increases the likelihood of exploitation once network access is obtained. Organizations using Atlassian products integrated with mcp-atlassian servers prior to version 0.17.0 face risks of data confidentiality breaches, integrity violations, and potential lateral movement within their networks. The vulnerability could also undermine trust in LLM-based tools by corrupting their data inputs.
Mitigation Recommendations
Organizations should immediately upgrade all instances of mcp-atlassian to version 0.17.0 or later, where this SSRF vulnerability is fixed. Until upgrades can be applied, network-level mitigations should be implemented: restrict access to the mcp-atlassian HTTP endpoint to trusted internal IP addresses only, using firewalls or network segmentation. Employ egress filtering to prevent unauthorized outbound HTTP requests from the server, especially blocking access to sensitive internal IP ranges such as the cloud instance metadata service (169.254.169.254). Monitor network traffic for unusual outbound requests originating from mcp-atlassian servers. Implement strict input validation and header inspection at the HTTP middleware layer if possible, to detect and block suspicious custom headers that could trigger SSRF. Conduct internal network scans to identify any exposed mcp-atlassian endpoints and remediate accordingly. Review and audit IAM role permissions to minimize the impact of potential credential theft. Finally, monitor logs and LLM tool outputs for signs of injection or poisoning attempts that may indicate exploitation.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-24T02:32:39.799Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b06a2b2f860ef943991eff
Added to database: 3/10/2026, 6:59:55 PM
Last enriched: 3/17/2026, 7:28:05 PM
Last updated: 4/24/2026, 2:23:20 PM
Views: 164
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.