Skip to content

Commit 51b029f

Browse files
1 parent ed65bc8 commit 51b029f

File tree

2 files changed

+113
-5
lines changed

2 files changed

+113
-5
lines changed

advisories/unreviewed/2026/03/GHSA-rqj3-x344-qvxc/GHSA-rqj3-x344-qvxc.json renamed to advisories/github-reviewed/2026/03/GHSA-rqj3-x344-qvxc/GHSA-rqj3-x344-qvxc.json

Lines changed: 49 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,59 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-rqj3-x344-qvxc",
4-
"modified": "2026-03-27T21:31:33Z",
4+
"modified": "2026-04-02T00:00:24Z",
55
"published": "2026-03-25T18:31:55Z",
66
"aliases": [
77
"CVE-2026-30587"
88
],
9-
"details": "Multiple Stored XSS vulnerabilities exist in Seafile Server version 13.0.15,13.0.16-pro,12.0.14 and prior and fixed in 13.0.17, 13.0.17-pro, and 12.0.20-pro, via the Seadoc (sdoc) editor. The application fails to properly sanitize WebSocket messages regarding document structure updates. This allows authenticated remote attackers to inject malicious JavaScript payloads via the src attribute of embedded Excalidraw whiteboards or the href attribute of anchor tags",
9+
"summary": "Seafile Server has multiple stored XSS vulnerabilities",
10+
"details": "Multiple Stored XSS vulnerabilities exist in Seafile Server version 13.0.15,13.0.16-pro,12.0.14 and prior and fixed in 13.0.17, 13.0.17-pro, and 12.0.20-pro, via the Seadoc (sdoc) editor. The application fails to properly sanitize WebSocket messages regarding document structure updates. This allows authenticated remote attackers to inject malicious JavaScript payloads via the src attribute of embedded Excalidraw whiteboards or the href attribute of anchor tags.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "npm",
21+
"name": "@seafile/sdoc-editor"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "3.0.0"
29+
},
30+
{
31+
"fixed": "3.0.75"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "npm",
40+
"name": "@seafile/sdoc-editor"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "0"
48+
},
49+
{
50+
"fixed": "2.0.209"
51+
}
52+
]
53+
}
54+
]
55+
}
56+
],
1757
"references": [
1858
{
1959
"type": "ADVISORY",
@@ -31,6 +71,10 @@
3171
"type": "WEB",
3272
"url": "https://gist.github.com/gabdevele/1b7e30ab367b26042fa32f45aa12ce2f"
3373
},
74+
{
75+
"type": "PACKAGE",
76+
"url": "https://github.com/haiwen/seadoc-editor"
77+
},
3478
{
3579
"type": "WEB",
3680
"url": "https://manual.seafile.com/12.0/changelog/changelog-for-seafile-professional-server"
@@ -49,8 +93,8 @@
4993
"CWE-79"
5094
],
5195
"severity": "MODERATE",
52-
"github_reviewed": false,
53-
"github_reviewed_at": null,
96+
"github_reviewed": true,
97+
"github_reviewed_at": "2026-04-02T00:00:24Z",
5498
"nvd_published_at": "2026-03-25T18:16:31Z"
5599
}
56100
}
Lines changed: 64 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,64 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-w2fm-25vw-vh7f",
4+
"modified": "2026-04-01T23:58:50Z",
5+
"published": "2026-04-01T23:58:50Z",
6+
"aliases": [],
7+
"summary": "mcp-handler has a tool response leak across concurrent client sessions ('Race Condition')",
8+
"details": "`mcp-handler` versions prior to 1.1.0 accepted `@modelcontextprotocol/sdk` < 1.26.0 as a peer dependency. That SDK version contains a vulnerability [[CVE-2026-25536](https://nvd.nist.gov/vuln/detail/CVE-2026-25536)] that causes concurrent requests from different clients to share server-side state including authentication context and tool execution results when a `StreamableHTTPServerTransport` instance is reused across requests.\n\n**Note:** This is _not_ a vulnerability in `mcp-handler` itself. The root cause is in the peer dependency `@modelcontextprotocol/sdk`. \n\n### Impact\n\nA low-privileged attacker making concurrent requests to an `mcp-handler` endpoint can read another client's session data, including authentication information and tool execution state. This is a confidentiality breach with potential for limited integrity impact.\n\n**Root Cause:** [CVE-2026-25536](https://nvd.nist.gov/vuln/detail/CVE-2026-25536) in `@modelcontextprotocol/sdk` < 1.26.0. The SDK did not prevent reuse of stateless transports across client connections.\n\n### Patches\n\nUpgrade to `mcp-handler@1.1.0`. This release raises the minimum peer dependency to `@modelcontextprotocol/sdk@>=1.26.0`, which contains the fix for CVE-2026-25536. \n\n### Workarounds\n\n- Upgrade `@modelcontextprotocol/sdk` to `>=1.26.0` (note: the SDK will throw on transport reuse, which will break `mcp-handler` < 1.1.0 which effectively forces the upgrade)\n- Alternatively, manually create fresh `McpServer` and transport instances per request in your handler code",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N"
13+
}
14+
],
15+
"affected": [
16+
{
17+
"package": {
18+
"ecosystem": "npm",
19+
"name": "mcp-handler"
20+
},
21+
"ranges": [
22+
{
23+
"type": "ECOSYSTEM",
24+
"events": [
25+
{
26+
"introduced": "0"
27+
},
28+
{
29+
"fixed": "1.1.0"
30+
}
31+
]
32+
}
33+
]
34+
}
35+
],
36+
"references": [
37+
{
38+
"type": "WEB",
39+
"url": "https://github.com/vercel/mcp-handler/security/advisories/GHSA-w2fm-25vw-vh7f"
40+
},
41+
{
42+
"type": "ADVISORY",
43+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25536"
44+
},
45+
{
46+
"type": "ADVISORY",
47+
"url": "https://github.com/advisories/GHSA-345p-7cg4-v4c7"
48+
},
49+
{
50+
"type": "PACKAGE",
51+
"url": "https://github.com/vercel/mcp-handler"
52+
}
53+
],
54+
"database_specific": {
55+
"cwe_ids": [
56+
"CWE-1395",
57+
"CWE-362"
58+
],
59+
"severity": "HIGH",
60+
"github_reviewed": true,
61+
"github_reviewed_at": "2026-04-01T23:58:50Z",
62+
"nvd_published_at": null
63+
}
64+
}

0 commit comments

Comments
 (0)