Markdownify MCP Server allows Server-Side Request Forgery (SSRF) via the Markdownify.get() function
Moderate severity
GitHub Reviewed
Published
May 29, 2025
to the GitHub Advisory Database
•
Updated May 29, 2025
Description
Published by the National Vulnerability Database
May 29, 2025
Published to the GitHub Advisory Database
May 29, 2025
Last updated
May 29, 2025
Reviewed
May 29, 2025
All versions of the package mcp-markdownify-server are vulnerable to Server-Side Request Forgery (SSRF) via the Markdownify.get() function. An attacker can craft a prompt that, once accessed by the MCP host, can invoke the webpage-to-markdown, bing-search-to-markdown, and youtube-to-markdown tools to issue requests and read the responses to attacker-controlled URLs, potentially leaking sensitive information.
References