CVE-2026-32111: CWE-918: Server-Side Request Forgery (SSRF) in homeassistant-ai ha-mcp
CVE-2026-32111 is a Server-Side Request Forgery (SSRF) vulnerability in the ha-mcp component of homeassistant-ai versions prior to 7. 0. 0. The vulnerability arises because the OAuth consent form accepts a user-supplied ha_url and makes an HTTP request to {ha_url}/api/config without validating the URL. This allows unauthenticated attackers to perform internal network reconnaissance by submitting arbitrary URLs. Two other OAuth-related code paths (REST and WebSocket) are also affected by this SSRF primitive. The primary deployment method using a private URL with a pre-configured HOMEASSISTANT_TOKEN is not vulnerable. The issue has a CVSS score of 5. 3 (medium severity) and was fixed in version 7. 0.
AI Analysis
Technical Summary
CVE-2026-32111 is a medium-severity SSRF vulnerability affecting ha-mcp, a server component of homeassistant-ai, in versions before 7.0.0. The vulnerability exists in the OAuth consent form beta feature, which accepts a user-supplied ha_url parameter and performs an HTTP GET request to the endpoint {ha_url}/api/config without any URL validation or sanitization. This lack of validation enables unauthenticated attackers to craft requests that cause the server to make arbitrary HTTP requests to internal or external network resources. The SSRF can be leveraged to perform internal network reconnaissance by observing error responses or timing differences (error oracle). Additionally, two other OAuth tool code paths involving REST and WebSocket calls share the same SSRF primitive, expanding the attack surface. However, the primary deployment method that uses a private URL with a pre-configured HOMEASSISTANT_TOKEN is not affected, limiting exposure in some configurations. The vulnerability does not allow direct data exfiltration or code execution but can be a stepping stone for further attacks, such as internal network mapping or accessing internal services not exposed externally. The issue was publicly disclosed on March 11, 2026, with no known active exploitation reported. The vulnerability was addressed and fixed in ha-mcp version 7.0.0 by implementing proper URL validation and restricting SSRF vectors.
Potential Impact
The primary impact of CVE-2026-32111 is unauthorized internal network reconnaissance through SSRF, which can reveal sensitive infrastructure details to attackers. Organizations using vulnerable versions of ha-mcp in homeassistant-ai may have their internal network topology exposed, potentially allowing attackers to identify internal services, ports, or misconfigurations that are not otherwise accessible externally. This can facilitate subsequent attacks such as lateral movement, privilege escalation, or exploitation of other internal vulnerabilities. Since the vulnerability is unauthenticated and requires no user interaction, it can be exploited remotely by any attacker with network access to the vulnerable service. Although the vulnerability does not directly compromise confidentiality, integrity, or availability of the ha-mcp server itself, the indirect exposure of internal network information can significantly increase the risk profile of affected organizations. The impact is especially critical in environments where homeassistant-ai is deployed in sensitive or segmented networks, such as smart building management, industrial IoT, or enterprise automation systems. The absence of known exploits in the wild currently limits immediate risk, but the medium CVSS score and ease of exploitation warrant prompt remediation.
Mitigation Recommendations
To mitigate CVE-2026-32111, organizations should upgrade ha-mcp to version 7.0.0 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, administrators should disable the OAuth consent form beta feature that accepts user-supplied ha_url parameters to prevent SSRF exploitation. Network-level controls such as firewall rules or web application firewalls (WAF) can be configured to restrict outbound HTTP requests from the ha-mcp server to only trusted internal or external endpoints, thereby limiting SSRF impact. Additionally, monitoring and logging HTTP requests initiated by ha-mcp can help detect suspicious SSRF attempts. Implementing strict input validation and URL whitelisting on any user-supplied URLs within the application is critical to prevent SSRF. Finally, segregating the ha-mcp server in a network segment with limited access to sensitive internal resources reduces the risk of internal network reconnaissance.
Affected Countries
United States, Germany, United Kingdom, Netherlands, Japan, South Korea, Australia, Canada, France, Sweden
CVE-2026-32111: CWE-918: Server-Side Request Forgery (SSRF) in homeassistant-ai ha-mcp
Description
CVE-2026-32111 is a Server-Side Request Forgery (SSRF) vulnerability in the ha-mcp component of homeassistant-ai versions prior to 7. 0. 0. The vulnerability arises because the OAuth consent form accepts a user-supplied ha_url and makes an HTTP request to {ha_url}/api/config without validating the URL. This allows unauthenticated attackers to perform internal network reconnaissance by submitting arbitrary URLs. Two other OAuth-related code paths (REST and WebSocket) are also affected by this SSRF primitive. The primary deployment method using a private URL with a pre-configured HOMEASSISTANT_TOKEN is not vulnerable. The issue has a CVSS score of 5. 3 (medium severity) and was fixed in version 7. 0.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-32111 is a medium-severity SSRF vulnerability affecting ha-mcp, a server component of homeassistant-ai, in versions before 7.0.0. The vulnerability exists in the OAuth consent form beta feature, which accepts a user-supplied ha_url parameter and performs an HTTP GET request to the endpoint {ha_url}/api/config without any URL validation or sanitization. This lack of validation enables unauthenticated attackers to craft requests that cause the server to make arbitrary HTTP requests to internal or external network resources. The SSRF can be leveraged to perform internal network reconnaissance by observing error responses or timing differences (error oracle). Additionally, two other OAuth tool code paths involving REST and WebSocket calls share the same SSRF primitive, expanding the attack surface. However, the primary deployment method that uses a private URL with a pre-configured HOMEASSISTANT_TOKEN is not affected, limiting exposure in some configurations. The vulnerability does not allow direct data exfiltration or code execution but can be a stepping stone for further attacks, such as internal network mapping or accessing internal services not exposed externally. The issue was publicly disclosed on March 11, 2026, with no known active exploitation reported. The vulnerability was addressed and fixed in ha-mcp version 7.0.0 by implementing proper URL validation and restricting SSRF vectors.
Potential Impact
The primary impact of CVE-2026-32111 is unauthorized internal network reconnaissance through SSRF, which can reveal sensitive infrastructure details to attackers. Organizations using vulnerable versions of ha-mcp in homeassistant-ai may have their internal network topology exposed, potentially allowing attackers to identify internal services, ports, or misconfigurations that are not otherwise accessible externally. This can facilitate subsequent attacks such as lateral movement, privilege escalation, or exploitation of other internal vulnerabilities. Since the vulnerability is unauthenticated and requires no user interaction, it can be exploited remotely by any attacker with network access to the vulnerable service. Although the vulnerability does not directly compromise confidentiality, integrity, or availability of the ha-mcp server itself, the indirect exposure of internal network information can significantly increase the risk profile of affected organizations. The impact is especially critical in environments where homeassistant-ai is deployed in sensitive or segmented networks, such as smart building management, industrial IoT, or enterprise automation systems. The absence of known exploits in the wild currently limits immediate risk, but the medium CVSS score and ease of exploitation warrant prompt remediation.
Mitigation Recommendations
To mitigate CVE-2026-32111, organizations should upgrade ha-mcp to version 7.0.0 or later, where the vulnerability is fixed. If immediate upgrade is not feasible, administrators should disable the OAuth consent form beta feature that accepts user-supplied ha_url parameters to prevent SSRF exploitation. Network-level controls such as firewall rules or web application firewalls (WAF) can be configured to restrict outbound HTTP requests from the ha-mcp server to only trusted internal or external endpoints, thereby limiting SSRF impact. Additionally, monitoring and logging HTTP requests initiated by ha-mcp can help detect suspicious SSRF attempts. Implementing strict input validation and URL whitelisting on any user-supplied URLs within the application is critical to prevent SSRF. Finally, segregating the ha-mcp server in a network segment with limited access to sensitive internal resources reduces the risk of internal network reconnaissance.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-10T22:02:38.855Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b1d7c72f860ef94378fdcf
Added to database: 3/11/2026, 8:59:51 PM
Last enriched: 3/19/2026, 2:30:41 AM
Last updated: 4/25/2026, 3:39:14 AM
Views: 204
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.