Cyber Posture

CVE-2026-27826

HighPublic PoC

Published: 10 March 2026

Published
10 March 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N
EPSS Score 0.0008 24.1th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.

Security Summary

MCP Atlassian is a Model Context Protocol (MCP) server designed for integration with Atlassian products such as Confluence and Jira. Versions prior to 0.17.0 contain a vulnerability (CVE-2026-27826, CWE-918) that allows an unauthenticated attacker to force the server process to make outbound HTTP requests to arbitrary attacker-controlled URLs. This server-side request forgery (SSRF) issue arises in the HTTP middleware and dependency injection layer, rather than in MCP tool handlers, rendering it undetectable by tool-level code analysis. The vulnerability has a CVSS v3.1 score of 8.2 (AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N).

An unauthenticated attacker with adjacent network access to the mcp-atlassian HTTP endpoint can exploit this by supplying two custom HTTP headers without an Authorization header. Successful exploitation enables the attacker to conduct internal network reconnaissance from the server's perspective. In cloud deployments, it facilitates theft of IAM role credentials by targeting the instance metadata endpoint at 169.254.169.254. Across any HTTP deployment, it allows injection of attacker-controlled content into LLM tool results.

The GitHub security advisory (GHSA-7r34-79r5-rcc9) and fixing commit (5cd697dfce9116ef330b8dc7a91291640e0528d9) confirm that upgrading to version 0.17.0 resolves the issue.

This vulnerability is particularly relevant to AI/ML deployments, as MCP servers bridge LLMs with enterprise tools, potentially exposing LLM integrations to SSRF-based content manipulation or credential theft. No real-world exploitation has been reported.

Details

CWE(s)
CWE-918

Affected Products

sooperset
mcp atlassian
≤ 0.17.0

AI Security Analysis

AI Category
AI Agent Protocols and Integrations
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
MITRE ATLAS Techniques
None mapped
Classification Reason
Matched keywords: mcp, model context protocol, mcp, mcp, mcp, llm

MITRE ATT&CK Enterprise Techniques

T1046 Network Service Discovery Discovery
Adversaries may attempt to get a listing of services running on remote hosts and local network infrastructure devices, including those that may be vulnerable to remote software exploitation.
T1552.005 Cloud Instance Metadata API Credential Access
Adversaries may attempt to access the Cloud Instance Metadata API to collect credentials and other sensitive data.
Why these techniques?

SSRF enables internal network reconnaissance mapping to Network Service Discovery (T1046) and theft of IAM credentials via cloud instance metadata endpoint mapping to Cloud Instance Metadata API (T1552.005).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References