Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 02 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zcaceres
Zcaceres markdownify Mcp Server |
|
| CPEs | cpe:2.3:a:zcaceres:markdownify_mcp_server:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zach
Zach markdownify Mcp |
Zcaceres
Zcaceres markdownify Mcp Server |
Wed, 17 Dec 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zach
Zach markdownify Mcp |
|
| CPEs | cpe:2.3:a:zach:markdownify_mcp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zach
Zach markdownify Mcp |
Thu, 11 Dec 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-918 | |
| Metrics |
cvssV3_1
|
Wed, 10 Dec 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Server-Side Request Forgery (SSRF) vulnerability was discovered in the webpage-to-markdown conversion feature of markdownify-mcp v0.0.2 and before. This vulnerability allows an attacker to bypass private IP restrictions through hostname-based bypass and HTTP redirect chains, enabling access to internal network services. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-12-11T20:36:15.697Z
Reserved: 2025-11-18T00:00:00.000Z
Link: CVE-2025-65512
Updated: 2025-12-11T20:22:10.580Z
Status : Analyzed
Published: 2025-12-10T21:16:07.163
Modified: 2026-01-02T16:03:34.423
Link: CVE-2025-65512
No data.
OpenCVE Enrichment
No data.