<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-7221 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-7221/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-7221/feed.xml" rel="self" type="application/rss+xml"/><item><title>TencentCloudBase CloudBase-MCP Server-Side Request Forgery Vulnerability (CVE-2026-7221)</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-cloudbase-ssrf/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-cloudbase-ssrf/</guid><description>A server-side request forgery vulnerability exists in TencentCloudBase CloudBase-MCP up to version 2.17.0, allowing remote attackers to manipulate the `req.body.url` argument in the `openUrl` function of `mcp/src/interactive-server.ts` to conduct SSRF attacks.</description><content:encoded><![CDATA[<p>A server-side request forgery (SSRF) vulnerability has been identified in TencentCloudBase CloudBase-MCP, affecting versions up to 2.17.0. The vulnerability resides in the <code>openUrl</code> function within the <code>mcp/src/interactive-server.ts</code> file. This flaw enables a remote attacker to manipulate the <code>req.body.url</code> argument passed to the open-url API Endpoint, forcing the server to make requests to arbitrary internal or external resources. Successful exploitation could lead to information disclosure, internal network scanning, or denial-of-service. The vulnerability is publicly known and actively exploitable. Users are advised to upgrade to version 2.17.1, which includes a patch (identified as 3f678a1e7bd400cd76469d61024097d4920dc6b5) to address this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a CloudBase-MCP instance running a vulnerable version (&lt;= 2.17.0).</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>openUrl</code> API endpoint.</li>
<li>The malicious request includes a <code>req.body.url</code> parameter containing a URL pointing to an internal resource (e.g., <code>http://localhost:8080/admin</code>) or an external server controlled by the attacker.</li>
<li>The CloudBase-MCP server, without proper validation, processes the request and attempts to open the URL specified in <code>req.body.url</code>.</li>
<li>If the URL points to an internal resource, the server retrieves the content of that resource and potentially exposes it to the attacker.</li>
<li>If the URL points to an external server, the server makes an HTTP request to the attacker&rsquo;s server, potentially leaking sensitive information like internal IP addresses or API keys.</li>
<li>The attacker analyzes the response from the server to gather information about the internal network or the CloudBase-MCP instance.</li>
<li>The attacker leverages the gathered information to further compromise the CloudBase-MCP instance or the internal network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability can allow attackers to read sensitive information from internal services, bypass firewall restrictions, and potentially gain unauthorized access to internal resources. This could lead to the disclosure of confidential data, compromise of internal systems, and further attacks on the organization&rsquo;s infrastructure. Although the number of victims isn&rsquo;t specified, any unpatched CloudBase-MCP instance is vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade TencentCloudBase CloudBase-MCP to version 2.17.1 or later to apply the patch (3f678a1e7bd400cd76469d61024097d4920dc6b5) that fixes CVE-2026-7221.</li>
<li>Implement input validation and sanitization on the <code>req.body.url</code> parameter to prevent manipulation by attackers.</li>
<li>Monitor web server logs for suspicious requests to the <code>openUrl</code> API endpoint with unusual or internal URLs, and deploy the Sigma rules below.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>SSRF</category><category>CVE-2026-7221</category><category>TencentCloudBase</category></item></channel></rss>