Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-353c-v8x9-v7c3 | MCP-Framework: Unbounded memory allocation in readRequestBody allows denial of service via HTTP transport |
Fri, 17 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Quantgeekdev
Quantgeekdev mcp-framework |
|
| Vendors & Products |
Quantgeekdev
Quantgeekdev mcp-framework |
Thu, 16 Apr 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mcp-framework is a framework for building Model Context Protocol (MCP) servers. In versions 0.2.21 and below, the readRequestBody() function in the HTTP transport concatenates request body chunks into a string with no size limit. Although a maxMessageSize configuration value exists, it is never enforced in readRequestBody(). A remote unauthenticated attacker can crash any mcp-framework HTTP server by sending a single large POST request to /mcp, causing memory exhaustion and denial of service. This issue has been fixed in version 0.2.22. | |
| Title | MCP-Framework: Unbounded memory allocation in readRequestBody allows denial of service via HTTP transport | |
| Weaknesses | CWE-770 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-17T18:46:07.726Z
Reserved: 2026-04-06T19:31:07.265Z
Link: CVE-2026-39313
Updated: 2026-04-17T18:46:03.911Z
Status : Deferred
Published: 2026-04-16T22:16:38.073
Modified: 2026-04-29T21:04:10.060
Link: CVE-2026-39313
No data.
OpenCVE Enrichment
Updated: 2026-04-17T08:01:26Z
Github GHSA