Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 07 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nhost cli
|
|
| CPEs | cpe:2.3:a:nhost:cli:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Nhost cli
|
|
| Metrics |
cvssV3_1
|
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Nhost
Nhost nhost |
|
| Vendors & Products |
Nhost
Nhost nhost |
Tue, 31 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Mar 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Nhost is an open source Firebase alternative with GraphQL. Prior to version 1.41.0, The Nhost CLI MCP server, when explicitly configured to listen on a network port, applies no inbound authentication and does not enforce strict CORS. This allows a malicious website visited on the same machine to issue cross-origin requests to the MCP server and invoke privileged tools using the developer's locally configured credentials. This vulnerability requires two explicit, non-default configuration steps to be exploitable. The default nhost mcp start configuration is not affected. This issue has been patched in version 1.41.0. | |
| Title | Nhost CLI MCP Server: Missing Inbound Authentication on Explicitly Bound Network Port | |
| Weaknesses | CWE-306 CWE-942 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-31T14:30:36.656Z
Reserved: 2026-03-26T15:57:52.323Z
Link: CVE-2026-34200
Updated: 2026-03-31T14:30:25.876Z
Status : Analyzed
Published: 2026-03-31T15:16:17.670
Modified: 2026-04-07T21:08:51.357
Link: CVE-2026-34200
No data.
OpenCVE Enrichment
Updated: 2026-04-08T20:00:22Z