1.0.0
1 years ago
13 days ago
Known vulnerabilities in the mcp-markdownify-server package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
mcp-markdownify-server is a Model Context Protocol (MCP) server that converts various file types and web content to Markdown format. It provides a set of tools to transform PDFs, images, audio files, web pages, and more into easily readable and shareable Markdown text. Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to the improper validation in Note: This is a bypass for the SSRF described by CVE-2025-5276. How to fix Server-side Request Forgery (SSRF)? There is no fixed version for | * |
mcp-markdownify-server is a Model Context Protocol (MCP) server that converts various file types and web content to Markdown format. It provides a set of tools to transform PDFs, images, audio files, web pages, and more into easily readable and shareable Markdown text. Affected versions of this package are vulnerable to Arbitrary Command Injection due to using How to fix Arbitrary Command Injection? A fix was pushed into the | * |