Origin Validation Error Affecting nushell package, versions <0.112.2-r3


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-WOLFILATEST-NUSHELL-16539186
  • published8 May 2026
  • disclosed14 May 2026

Introduced: 8 May 2026

NewCVE-2026-42559  (opens in a new tab)
CWE-346  (opens in a new tab)
CWE-350  (opens in a new tab)

How to fix?

Upgrade Wolfi nushell to version 0.112.2-r3 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream nushell package and not the nushell package as distributed by Wolfi. See How to fix? for Wolfi relevant fixed versions and status.

RMCP is an official Rust SDK for the Model Context Protocol. Prior to version 1.4.0, the rmcp crate's Streamable HTTP server transport (crates/rmcp/src/transport/streamable_http_server/) did not validate the incoming Host header. This allowed a malicious public website, via a DNS rebinding attack, to send authenticated requests to an MCP server running on the victim's loopback or private-network interface. This vulnerability is fixed in 1.4.0.