CVE-2026-29787
Plain English Summary
AI-powered analysis for quick understanding
An attacker can access sensitive system information, such as the operating system version and database paths, through an unsecured endpoint if the service is configured to allow anonymous access. This is particularly risky if the service is set to listen on all network interfaces, making it visible to anyone on the network.
Technical Description
mcp-memory-service is an open-source memory backend for multi-agent systems. Prior to version 10.21.0, the /api/health/detailed endpoint returns detailed system information including OS version, Python version, CPU count, memory totals, disk usage, and the full database filesystem path. When MCP_ALLOW_ANONYMOUS_ACCESS=true is set (required for the HTTP server to function without OAuth/API key), this endpoint is accessible without authentication. Combined with the default 0.0.0.0 binding, this exposes sensitive reconnaissance data to the entire network. This issue has been patched in version 10.21.0.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 7, 2026
about 1 month ago
Last Modified
Mar 11, 2026
27 days ago
Vendor
doobidoo
Product
mcp-memory-service