GHSA-v8vw-gw5j-w7m6Medium
MCP Registry has open redirect via protocol-relative path in trailing-slash middleware
🔗 CVE IDs covered (1)
📋 Description
### Summary
The TrailingSlashMiddleware in internal/api/server.go is vulnerable to an open redirect attack. An attacker can craft a URL with a protocol-relative path (e.g., //evil.com/) that, after trailing slash removal, results in a Location header of //evil.com — which browsers interpret as an absolute URL to an external domain.
### Details
The TrailingSlashMiddleware strips trailing slashes from request paths and issues a 308 Permanent Redirect to the cleaned path. However, it does not validate or sanitize the resulting path before using it as the redirect target.
When a request is made with a path like //evil.com/, the middleware processes it as follows:
### PoC
1. Start the registry server locally or identify a deployed instance
2. Send a request with a double-slash path followed by an external domain:
`curl -v https://<registry-host>//evil.com/`
<img width="3066" height="969" alt="image" src="https://github.com/user-attachments/assets/a5305f00-29bf-4708-952a-478d608f2074" />
3. Observe the 308 Permanent Redirect response with Location: //evil.com:
4. When accessed in a browser, the user is redirected to https://evil.com
### Impact
**Phishing**: Attackers can abuse the trusted registry domain to redirect users to credential-harvesting pages
**Malware distribution**: Redirect users to sites serving malicious downloads
**Trust abuse:** Links originating from the official MCP Registry domain carry implicit trust
🎯 Affected products1
- go/github.com/modelcontextprotocol/registry:>= 1.1.0, < 1.7.5
🔗 References (6)
- https://github.com/modelcontextprotocol/registry/security/advisories/GHSA-v8vw-gw5j-w7m6
- https://github.com/modelcontextprotocol/registry/pull/1227
- https://github.com/modelcontextprotocol/registry/commit/1201cbd82b2cf6d4b56edfc05c763059a12f9fdb
- https://github.com/modelcontextprotocol/registry/releases/tag/v1.7.5
- https://nvd.nist.gov/vuln/detail/CVE-2026-44427
- https://github.com/advisories/GHSA-v8vw-gw5j-w7m6