Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32111: CWE-918: Server-Side Request Forgery (SSRF) in homeassistant-ai ha-mcp

0
Medium
VulnerabilityCVE-2026-32111cvecve-2026-32111cwe-918
Published: Wed Mar 11 2026 (03/11/2026, 20:41:37 UTC)
Source: CVE Database V5
Vendor/Project: homeassistant-ai
Product: ha-mcp

Description

CVE-2026-32111 is a Server-Side Request Forgery (SSRF) vulnerability in the ha-mcp component of homeassistant-ai versions prior to 7. 0. 0. The vulnerability arises because the OAuth consent form accepts a user-supplied ha_url and makes an HTTP request to {ha_url}/api/config without validating the URL. This allows an unauthenticated attacker to submit arbitrary URLs, potentially enabling internal network reconnaissance through error responses. Two other OAuth-related code paths (REST and WebSocket) are also affected by the same SSRF primitive. The primary deployment method using a private URL with a pre-configured HOMEASSISTANT_TOKEN is not vulnerable. The issue has a CVSS score of 5. 3 (medium severity) and was fixed in version 7. 0.

AI-Powered Analysis

AILast updated: 03/11/2026, 21:14:39 UTC

Technical Analysis

The vulnerability CVE-2026-32111 affects the ha-mcp server component of homeassistant-ai, specifically versions before 7.0.0. The flaw is a Server-Side Request Forgery (SSRF) caused by insufficient validation of user-supplied URLs in the OAuth consent form beta feature. When a user submits a ha_url, the server makes an HTTP request to the path {ha_url}/api/config without verifying the legitimacy or safety of the URL. This allows an unauthenticated attacker to induce the server to send requests to arbitrary internal or external network locations, potentially exposing internal network structure or services through error messages or response timing (an error oracle). Additionally, two other OAuth-related code paths—REST and WebSocket calls—are vulnerable to the same SSRF primitive. However, the main deployment method, which uses a private URL with a pre-configured HOMEASSISTANT_TOKEN, is not affected by this vulnerability. The issue was publicly disclosed on March 11, 2026, and fixed in version 7.0.0 of ha-mcp. The CVSS 3.1 base score is 5.3, reflecting a medium severity rating, with no privileges or user interaction required for exploitation. No known active exploits have been reported to date.

Potential Impact

This SSRF vulnerability can allow unauthenticated attackers to perform internal network reconnaissance by making the vulnerable server send crafted HTTP requests to arbitrary URLs, including internal IP addresses and services not normally accessible externally. This can lead to information disclosure about internal network topology, services, and potentially sensitive endpoints. While the vulnerability does not directly allow code execution or data modification, the reconnaissance information gained can be leveraged for further attacks such as lateral movement, exploitation of internal services, or pivoting within the network. Organizations using ha-mcp versions prior to 7.0.0 with the vulnerable OAuth consent form feature enabled are at risk. The impact is particularly significant for deployments exposing the OAuth consent form publicly without additional network segmentation or filtering. Since the primary deployment method with HOMEASSISTANT_TOKEN is not affected, the risk is somewhat mitigated for those configurations. Overall, the vulnerability poses a moderate risk of information leakage and internal network exposure.

Mitigation Recommendations

Upgrade ha-mcp to version 7.0.0 or later, where the vulnerability is fixed by implementing proper URL validation and restricting SSRF vectors. If upgrading immediately is not possible, disable the OAuth consent form beta feature that accepts user-supplied ha_url parameters to prevent exploitation. Implement network-level protections such as firewall rules or access control lists to restrict outbound HTTP requests from the ha-mcp server to only trusted destinations, thereby limiting SSRF impact. Monitor logs for unusual outbound requests originating from the ha-mcp server that may indicate exploitation attempts. Employ web application firewalls (WAFs) with SSRF detection capabilities to block suspicious requests targeting the OAuth endpoints. Conduct internal network segmentation to isolate critical services and reduce the attack surface exposed via SSRF. Finally, review and restrict OAuth-related API endpoints to authenticated and authorized users where possible, even if the primary deployment method is not affected.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T22:02:38.855Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1d7c72f860ef94378fdcf

Added to database: 3/11/2026, 8:59:51 PM

Last enriched: 3/11/2026, 9:14:39 PM

Last updated: 3/11/2026, 11:06:23 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses