Moderate severityGHSA Advisory· Published Dec 9, 2025· Updated Dec 11, 2025
CVE-2025-65513
CVE-2025-65513
Description
fetch-mcp v1.0.2 and before is vulnerable to Server-Side Request Forgery (SSRF) vulnerability, which allows attackers to bypass private IP validation and access internal network resources.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mcp-fetch-servernpm | <= 1.0.2 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-8fxj-2g9q-8fjwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-65513ghsaADVISORY
- github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-65513.mdghsaWEB
- github.com/zcaceres/fetch-mcp/blob/c662c8ac300f715e414a64766cd95cc9ec60a1b3/src/Fetcher.tsghsaWEB
- thorn-pheasant-6d8.notion.site/fetch-mcp-2853daf7b44180029ca5d56e03195736ghsaWEB
News mentions
0No linked articles in our index yet.