This issue affects Apache SkyWalking MCP: 0.1.0.
Users are recommended to upgrade to version 0.2.0, which fixes this issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-c4hg-6933-x62x | Apache SkyWalking MCP: Server-Side Request Forgery via SW-URL Header in MCP Server |
Mon, 20 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache skywalking Mcp
|
|
| CPEs | cpe:2.3:a:apache:skywalking_mcp:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache skywalking Mcp
|
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache skywalking |
|
| Vendors & Products |
Apache
Apache skywalking |
Mon, 13 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 13 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 13 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Server-Side Request Forgery via SW-URL Header vulnerability in Apache SkyWalking MCP. This issue affects Apache SkyWalking MCP: 0.1.0. Users are recommended to upgrade to version 0.2.0, which fixes this issue. | |
| Title | Apache SkyWalking MCP: Server-Side Request Forgery via SW-URL Header in MCP Server | |
| Weaknesses | CWE-918 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-04-13T15:29:57.926Z
Reserved: 2026-03-28T02:38:58.575Z
Link: CVE-2026-34476
Updated: 2026-04-13T15:29:57.926Z
Status : Analyzed
Published: 2026-04-13T13:16:40.847
Modified: 2026-04-20T16:45:47.080
Link: CVE-2026-34476
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:34:35Z
Github GHSA