CVE-2026-33010
Description
mcp-memory-service is an open-source memory backend for multi-agent systems. Prior to version 10.25.1, when the HTTP server is enabled (MCP_HTTP_ENABLED=true), the application configures FastAPI's CORSMiddleware with allow_origins=['*'], allow_credentials=True, allow_methods=["*"], and allow_headers=["*"]. The wildcard Access-Control-Allow-Origin: * header permits any website to read API responses cross-origin. When combined with anonymous access (MCP_ALLOW_ANONYMOUS_ACCESS=true) - the simplest way to get the HTTP dashboard working without OAuth - no credentials are needed, so any malicious website can silently read, modify, and delete all stored memories. This issue has been patched in version 10.25.1.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mcp-memory-servicePyPI | < 10.25.1 | 10.25.1 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/doobidoo/mcp-memory-service/security/advisories/GHSA-g9rg-8vq5-mpwmnvdExploitVendor AdvisoryWEB
- github.com/advisories/GHSA-g9rg-8vq5-mpwmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-33010ghsaADVISORY
News mentions
0No linked articles in our index yet.