Permissive Cross-domain Policy with Untrusted Domains Affecting @yoda.digital/gitlab-mcp-server package, versions <0.6.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Permissive Cross-domain Policy with Untrusted Domains vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-YODADIGITALGITLABMCPSERVER-16691230
  • published14 May 2026
  • disclosed9 May 2026
  • creditUnknown

Introduced: 9 May 2026

NewCVE-2026-44895  (opens in a new tab)
CWE-306  (opens in a new tab)
CWE-942  (opens in a new tab)

How to fix?

Upgrade @yoda.digital/gitlab-mcp-server to version 0.6.0 or higher.

Overview

@yoda.digital/gitlab-mcp-server is a GitLab MCP Server - A Model Context Protocol server for GitLab integration

Affected versions of this package are vulnerable to Permissive Cross-domain Policy with Untrusted Domains via the SSE HTTP transport when USE_SSE=true is set, which lacks authentication and uses a wildcard CORS policy. An attacker can gain unauthorized access to all available GitLab tools and perform destructive operations by sending unauthenticated requests to the exposed endpoints from any network location or cross-origin browser context. This is only exploitable if the server is running with USE_SSE=true and is accessible from the attacker's network or browser context.

CVSS Base Scores

version 4.0
version 3.1