Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g9rg-8vq5-mpwm | mcp-memory-service's Wildcard CORS with Credentials Enables Cross-Origin Memory Theft |
Tue, 14 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | NVD-CWE-Other | |
| CPEs | cpe:2.3:a:doobidoo:mcp-memory-service:*:*:*:*:*:*:*:* |
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Doobidoo
Doobidoo mcp-memory-service |
|
| Vendors & Products |
Doobidoo
Doobidoo mcp-memory-service |
Sat, 21 Mar 2026 05:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mcp-memory-service is an open-source memory backend for multi-agent systems. Prior to version 10.25.1, when the HTTP server is enabled (MCP_HTTP_ENABLED=true), the application configures FastAPI's CORSMiddleware with allow_origins=['*'], allow_credentials=True, allow_methods=["*"], and allow_headers=["*"]. The wildcard Access-Control-Allow-Origin: * header permits any website to read API responses cross-origin. When combined with anonymous access (MCP_ALLOW_ANONYMOUS_ACCESS=true) - the simplest way to get the HTTP dashboard working without OAuth - no credentials are needed, so any malicious website can silently read, modify, and delete all stored memories. This issue has been patched in version 10.25.1. | |
| Title | mcp-memory-service's Wildcard CORS with Credentials Enables Cross-Origin Memory Theft | |
| Weaknesses | CWE-942 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T23:26:06.857Z
Reserved: 2026-03-17T17:22:14.664Z
Link: CVE-2026-33010
Updated: 2026-03-20T23:25:58.571Z
Status : Analyzed
Published: 2026-03-20T19:16:17.813
Modified: 2026-04-14T18:12:23.217
Link: CVE-2026-33010
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:45:09Z
Github GHSA