Platform
nodejs
Component
a11y-mcp
Fixed in
1.0.1
1.0.2
1.0.3
1.0.4
1.0.5
1.0.6
1.0.5
CVE-2026-5323 describes a server-side request forgery (SSRF) vulnerability discovered in the a11y-mcp Node.js package. This flaw allows attackers to potentially make unauthorized requests on behalf of the server, leading to data exposure or access to internal resources. The vulnerability affects versions up to 1.0.5, and a fix is available in version 1.0.6.
An attacker can exploit this SSRF vulnerability by manipulating the A11yServer function within the src/index.js file. Because the attack must originate from a local position, it suggests a scenario where an attacker has already gained some level of access to the network where the a11y-mcp package is deployed. Successful exploitation could allow the attacker to access internal services, read sensitive data from internal endpoints, or even potentially interact with other systems within the network. The public availability of the exploit increases the risk of immediate exploitation.
The exploit for CVE-2026-5323 has been publicly disclosed, indicating a higher probability of exploitation. While the attack requires a local position, the availability of a public proof-of-concept significantly lowers the barrier to entry for attackers. The vulnerability is not currently listed on CISA KEV, and no active exploitation campaigns have been publicly reported as of the publication date. The NVD entry was published on 2026-04-02.
Exploit Status
EPSS
0.01% (2% percentile)
CISA SSVC
CVSS Vector
The primary mitigation for CVE-2026-5323 is to upgrade the a11y-mcp package to version 1.0.6 or later. This version includes a patch (commit e3e11c9e8482bd06b82fd9fced67be4856f0dffc) that addresses the SSRF vulnerability. Given the rolling release nature of this package, there are no specific affected or updated versions beyond the stated range. As a temporary workaround, consider implementing strict network segmentation to limit the potential impact of a successful SSRF attack. Review and restrict outbound network access from the application to only necessary destinations. After upgrading, confirm the fix by attempting to trigger the SSRF vulnerability and verifying that the request is blocked.
Update the a11y-mcp package to version 1.0.6 or higher. This corrects the Server-Side Request Forgery (SSRF) vulnerability in the A11yServer function of the file src/index.js.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2026-5323 is a server-side request forgery vulnerability affecting the priyankark a11y-mcp Node.js package, allowing attackers to make unauthorized requests from a local position.
You are affected if you are using a11y-mcp versions up to 1.0.5. Check your installed version using npm list a11y-mcp.
Upgrade to version 1.0.6 or later. Use npm install a11y-mcp@latest to update.
While no active campaigns are confirmed, the exploit is publicly available, increasing the risk of exploitation.
Refer to the package's release notes or repository for the official advisory: [https://github.com/PriyankaRK/a11y-mcp](https://github.com/PriyankaRK/a11y-mcp)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.