Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32111: CWE-918: Server-Side Request Forgery (SSRF) in homeassistant-ai ha-mcp

0
Medium
VulnerabilityCVE-2026-32111cvecve-2026-32111cwe-918
Published: Wed Mar 11 2026 (03/11/2026, 20:41:37 UTC)
Source: CVE Database V5
Vendor/Project: homeassistant-ai
Product: ha-mcp

Description

CVE-2026-32111 is a Server-Side Request Forgery (SSRF) vulnerability in the ha-mcp component of homeassistant-ai versions prior to 7. 0. 0. The vulnerability arises because the OAuth consent form accepts a user-supplied ha_url and makes an HTTP request to {ha_url}/api/config without validating the URL. This allows unauthenticated attackers to perform internal network reconnaissance by submitting arbitrary URLs. Two other OAuth-related code paths (REST and WebSocket) are also affected by this SSRF primitive. The primary deployment method using a private URL with a pre-configured HOMEASSISTANT_TOKEN is not vulnerable. The issue has a CVSS score of 5. 3 (medium severity) and was fixed in version 7. 0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:30:41 UTC

Technical Analysis

CVE-2026-32111 is a medium-severity SSRF vulnerability affecting ha-mcp, a server component of homeassistant-ai, in versions before 7.0.0. The vulnerability exists in the OAuth consent form beta feature, which accepts a user-supplied ha_url parameter and performs an HTTP GET request to the endpoint {ha_url}/api/config without any URL validation or sanitization. This lack of validation enables unauthenticated attackers to craft requests that cause the server to make arbitrary HTTP requests to internal or external network resources. The SSRF can be leveraged to perform internal network reconnaissance by observing error responses or timing differences (error oracle). Additionally, two other OAuth tool code paths involving REST and WebSocket calls share the same SSRF primitive, expanding the attack surface. However, the primary deployment method that uses a private URL with a pre-configured HOMEASSISTANT_TOKEN is not affected, limiting exposure in some configurations. The vulnerability does not allow direct data exfiltration or code execution but can be a stepping stone for further attacks, such as internal network mapping or accessing internal services not exposed externally. The issue was publicly disclosed on March 11, 2026, with no known active exploitation reported. The vulnerability was addressed and fixed in ha-mcp version 7.0.0 by implementing proper URL validation and restricting SSRF vectors.

Potential Impact

The primary impact of CVE-2026-32111 is unauthorized internal network reconnaissance through SSRF, which can reveal sensitive infrastructure details to attackers. Organizations using vulnerable versions of ha-mcp in homeassistant-ai may have their internal network topology exposed, potentially allowing attackers to identify internal services, ports, or misconfigurations that are not otherwise accessible externally. This can facilitate subsequent attacks such as lateral movement, privilege escalation, or exploitation of other internal vulnerabilities. Since the vulnerability is unauthenticated and requires no user interaction, it can be exploited remotely by any attacker with network access to the vulnerable service. Although the vulnerability does not directly compromise confidentiality, integrity, or availability of the ha-mcp server itself, the indirect exposure of internal network information can significantly increase the risk profile of affected organizations. The impact is especially critical in environments where homeassistant-ai is deployed in sensitive or segmented networks, such as smart building management, industrial IoT, or enterprise automation systems. The absence of known exploits in the wild currently limits immediate risk, but the medium CVSS score and ease of exploitation warrant prompt remediation.

Mitigation Recommendations

To mitigate CVE-2026-32111, organizations should upgrade ha-mcp to version 7.0.0 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, administrators should disable the OAuth consent form beta feature that accepts user-supplied ha_url parameters to prevent SSRF exploitation. Network-level controls such as firewall rules or web application firewalls (WAF) can be configured to restrict outbound HTTP requests from the ha-mcp server to only trusted internal or external endpoints, thereby limiting SSRF impact. Additionally, monitoring and logging HTTP requests initiated by ha-mcp can help detect suspicious SSRF attempts. Implementing strict input validation and URL whitelisting on any user-supplied URLs within the application is critical to prevent SSRF. Finally, segregating the ha-mcp server in a network segment with limited access to sensitive internal resources reduces the risk of internal network reconnaissance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-10T22:02:38.855Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1d7c72f860ef94378fdcf

Added to database: 3/11/2026, 8:59:51 PM

Last enriched: 3/19/2026, 2:30:41 AM

Last updated: 4/25/2026, 3:39:14 AM

Views: 204

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses