<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Obot-Platform — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/obot-platform/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 15:36:01 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/obot-platform/feed.xml" rel="self" type="application/rss+xml"/><item><title>Obot Authorization Bypass in /mcp-connect/{id} Endpoint</title><link>https://feed.craftedsignal.io/briefs/2026-05-obot-auth-bypass/</link><pubDate>Wed, 13 May 2026 15:36:01 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-obot-auth-bypass/</guid><description>Obot version 0.21.0 has an authorization bypass vulnerability in the `/mcp-connect/{id}` endpoint allowing any authenticated user to connect to any registered MCP server, regardless of permissions, leading to unauthorized access and actions on upstream services.</description><content:encoded><![CDATA[<p>Obot version 0.21.0 is vulnerable to an authorization bypass in the <code>/mcp-connect/{id}</code> endpoint. This flaw allows any authenticated user, even those without explicit permissions, to connect to any registered MCP server. The vulnerability stems from a missing access control check on the <code>/mcp-connect/{mcp_id}</code> gateway endpoint. This means that any user possessing an MCP Server ID can connect to that server through the gateway and make tool calls, effectively circumventing intended restrictions. This critical vulnerability could enable unauthorized access to sensitive data and operations on upstream third-party services accessible via Obot&rsquo;s stored OAuth credentials.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a target MCP server ID.</li>
<li>The attacker authenticates to Obot with a basic user account.</li>
<li>The attacker crafts a malicious POST request to <code>/mcp-connect/&lt;mcp_server_id&gt;</code>.</li>
<li>The request includes a valid Obot session cookie or API key in the <code>Authorization</code> header.</li>
<li>The request body contains a JSON-RPC payload to list available tools on the MCP server: <code>{&quot;jsonrpc&quot;:&quot;2.0&quot;,&quot;id&quot;:1,&quot;method&quot;:&quot;tools/list&quot;}</code>.</li>
<li>The attacker observes a successful response, confirming access to the MCP server&rsquo;s tools, bypassing intended access controls.</li>
<li>The attacker crafts a subsequent JSON-RPC request to call a sensitive tool: <code>{&quot;jsonrpc&quot;:&quot;2.0&quot;,&quot;id&quot;:2,&quot;method&quot;:&quot;tools/call&quot;, &quot;params&quot;:{&quot;name&quot;:&quot;&lt;sensitive_tool&gt;&quot;,&quot;arguments&quot;:{...}}}</code>.</li>
<li>The attacker executes the tool call successfully, gaining access to data and functionality normally restricted to authorized users, leveraging the MCP server&rsquo;s OAuth credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability allows unauthorized users to access and manipulate sensitive data within connected MCP servers. The severity of the impact depends on the capabilities exposed by the affected MCP servers and the scope of their stored OAuth credentials. A successful exploit could lead to unauthorized data exfiltration, modification of critical systems, or other malicious activities, potentially impacting a wide range of services integrated with Obot, and could affect any number of Obot users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to a patched version of Obot that addresses the authorization bypass vulnerability.</li>
<li>Monitor web server logs for POST requests to <code>/mcp-connect/</code> with unusual user agents or API keys, using the <code>Detect Obot MCP Connect Authorization Bypass</code> Sigma rule.</li>
<li>Implement strict access control policies for MCP server registrations to limit the potential blast radius of a successful exploit.</li>
<li>Review and restrict the permissions granted to Obot&rsquo;s stored OAuth credentials to minimize the impact of unauthorized access.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authorization bypass</category><category>privilege escalation</category><category>mcp</category><category>cloud</category></item></channel></rss>