CVE-2025-5276

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-5276
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-5276.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-5276
Aliases
Published
2025-05-29T05:15:21Z
Modified
2025-05-29T20:17:58Z
Summary
[none]
Details

All versions of the package mcp-markdownify-server are vulnerable to Server-Side Request Forgery (SSRF) via the Markdownify.get() function. An attacker can craft a prompt that, once accessed by the MCP host, can invoke the webpage-to-markdown, bing-search-to-markdown, and youtube-to-markdown tools to issue requests and read the responses to attacker-controlled URLs, potentially leaking sensitive information.

References

Affected packages

Git / github.com/zcaceres/markdownify-mcp

Affected ranges

Type
GIT
Repo
https://github.com/zcaceres/markdownify-mcp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed