Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-fj4g-2p96-q6m3 | Network-AI missing authentication on MCP HTTP endpoint, which allows unauthenticated privileged tool calls |
Tue, 12 May 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Jovancoding
Jovancoding network-ai |
|
| Vendors & Products |
Jovancoding
Jovancoding network-ai |
Mon, 11 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 11 May 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Network-AI is a TypeScript/Node.js multi-agent orchestrator. Prior to 5.1.3, the MCP HTTP transport accepts JSON-RPC tools/call requests with no authentication, session, origin, or token check, and dispatches them directly to the orchestrator's tool registry. The default bind address is 0.0.0.0. As a result, any party with network reachability to the service can enumerate and invoke privileged management tools. This vulnerability is fixed in 5.1.3. | |
| Title | Network-AI: Missing authentication on MCP HTTP endpoint allows unauthenticated privileged tool calls | |
| Weaknesses | CWE-306 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T18:33:59.839Z
Reserved: 2026-04-30T16:44:48.379Z
Link: CVE-2026-42856
Updated: 2026-05-11T18:33:51.648Z
Status : Deferred
Published: 2026-05-11T18:16:35.990
Modified: 2026-05-13T17:31:40.840
Link: CVE-2026-42856
No data.
OpenCVE Enrichment
Updated: 2026-05-12T09:22:44Z
Github GHSA