Skip to content
CVSS 7.3 · HIGH

CVE-2026-7147

A vulnerability was detected in JoeCastrom mcp-chat-studio up to 1.5.0. Affected by this issue is some unknown functionality of the file server/routes/llm.js of the component LLM Models API. Performing a manipulation of the argument req.query.base_url results in server-side request forgery. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

View on NVD

Analysis

This is a server-side request forgery vulnerability in mcp-chat-studio, a niche tool for managing Model Context Protocol chat interfaces. While the exploit is public and allows remote attacks, the software is not widely used enough in the general developer community to justify a broad security alert.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE): CWE-918

EPSS

Probability of exploitation (next 30 days): 0.0005 (0.1%)
Percentile: 16.4%
EPSS: 2026-05-06

Technical description

A vulnerability was detected in JoeCastrom mcp-chat-studio up to 1.5.0. Affected by this issue is some unknown functionality of the file server/routes/llm.js of the component LLM Models API. Performing a manipulation of the argument req.query.base_url results in server-side request forgery. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Published: 4/27/2026, 7:16:53 PM
Last modified: 4/29/2026, 1:00:01 AM

References

HomeEventsBlogResourcesTeam