Skip to content

[GHSA-hhfx-wfvq-7g9c] Azure MCP Server has Server-Side Request Forgery issue that allows authorized attacker to elevate privileges over a network#7152

Open
vcolin7 wants to merge 1 commit intovcolin7/advisory-improvement-7152from
vcolin7-GHSA-hhfx-wfvq-7g9c
Open

[GHSA-hhfx-wfvq-7g9c] Azure MCP Server has Server-Side Request Forgery issue that allows authorized attacker to elevate privileges over a network#7152
vcolin7 wants to merge 1 commit intovcolin7/advisory-improvement-7152from
vcolin7-GHSA-hhfx-wfvq-7g9c

Conversation

@vcolin7
Copy link

@vcolin7 vcolin7 commented Mar 12, 2026

Updates

  • Affected products

Comments
Affected versions of the Azure MCP Server were also published to NPM and PyPI. This update adds details for said package managers.

Copilot AI review requested due to automatic review settings March 12, 2026 00:47
@github-actions github-actions bot changed the base branch from main to vcolin7/advisory-improvement-7152 March 12, 2026 00:48
Copy link

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the GHSA advisory record for GHSA-hhfx-wfvq-7g9c (Azure MCP Server SSRF) to reflect additional affected distributions published on other package managers, ensuring downstream consumers can correctly match vulnerable versions across ecosystems.

Changes:

  • Update the advisory modified timestamp.
  • Add affected package entries for npm (@azure/mcp, both 1.x and 2.x beta lines) and PyPI (msmcp-azure).

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

You can also share your feedback on Copilot code review. Take the survey.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants