Server-side Request Forgery (SSRF) Affecting utcp-http package, versions [,1.1.3)


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-UTCPHTTP-16635442
  • published11 May 2026
  • disclosed7 May 2026
  • creditUnknown

Introduced: 7 May 2026

NewCVE-2026-44661  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade utcp-http to version 1.1.3 or higher.

Overview

utcp-http is an UTCP communication protocol plugin for HTTP, SSE, and streamable HTTP, plus an OpenAPI converter.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) via the call_tool and call_tool_streaming functions when attacker-controlled URLs from OpenAPI server specifications are not properly validated. An attacker can access internal network resources and sensitive cloud metadata by supplying a malicious OpenAPI specification that references internal or restricted endpoints.

Workaround

This vulnerability can be mitigated by refusing to call register_manual with any URL controlled by an untrusted party, even over HTTPS, and by restricting outbound network access from the host running the agent so internal addresses are unreachable.

CVSS Base Scores

version 4.0
version 3.1