@yoda.digital/gitlab-mcp-server's SSE transport has no authentication and wildcard CORS, exposing all 86 GitLab tools
Description
SSE
Transport Has No Authentication and Wildcard CORS, Exposing All 86 GitLab Tools Including Destructive Operations
A review of mcp-gitlab-server at commit 80a7b4cf3fba6b55389c0ef491a48190f7c8996a uncovered that the SSE HTTP transport — advertised in the README and comparison table as a differentiating feature — runs with no authentication and wildcard CORS on every endpoint. The maintainers' own roadmap confirms auth is a known gap.
When USE_SSE=true, the HTTP server in src/transport.ts sets:
res.setHeader('Access-Control-Allow-Origin', '*');
res.setHeader('Access-Control-Allow-Methods', 'GET, POST');
res.setHeader('Access-Control-Allow-Headers', 'Content-Type');
The httpServer.listen(port) call at line 97 passes no host argument — Node.js defaults to 0.0.0.0, binding on all interfaces. Two endpoints are exposed with no credential check:
GET /sse— opens an SSE connection, returns a session endpoint URLPOST /messages?sessionId=<id>— sends MCP messages to the server using the loadedGITLAB_PERSONAL_ACCESS_TOKEN
Any caller who can reach the port — LAN, cloud instance, or via the browser-tab vector the wildcard CORS enables — gets full access to all 86 tools the server exposes using the operator's GitLab PAT. That includes delete_repository, delete_group, push_files, create_merge_request, update_repository_settings, and any other tool the server exposes. The PAT doesn't leave the process, but every API call it backs is available to the unauthenticated caller.
The wildcard CORS makes the browser-tab vector direct: any web page the operator visits while the server is running can open an SSE connection and make tool calls via cross-origin fetch. No user interaction beyond visiting the page.
PoC — reproduces from the documented USE_SSE=true configuration:
# Step 1: connect SSE and capture the session endpoint
curl -N http://localhost:3000/sse &
# Output includes: event: endpoint
# data: /messages?sessionId=<UUID>
# Step 2: call any tool — no auth header needed
curl -X POST "http://localhost:3000/messages?sessionId=<UUID>" \
-H "Content-Type: application/json" \
-d '{
"jsonrpc": "2.0",
"id": 1,
"method": "tools/call",
"params": {
"name": "get_repository",
"arguments": {"project_id": "target-org/private-repo"}
}
}'
# Returns repository data using the operator's GitLab PAT
# Same path works for delete_repository, push_files, etc.
Root cause
The HTTP transport in src/transport.ts ships with no authentication layer at all and a wildcard Access-Control-Allow-Origin: * on every response. The structural defect is that the SSE server stands up a stateful, mutation-capable RPC endpoint that is backed by the operator's GITLAB_PERSONAL_ACCESS_TOKEN without any inbound credential check, then advertises itself to every cross-origin browser context via the wildcard CORS header. The httpServer.listen(port) call at line 97 also passes no host argument, so the bind defaults to 0.0.0.0 and exposes the auth-less surface on every interface. Auth isn't fail-opening on a missing config — there is no auth check at any code path on either /sse or /messages?sessionId=....
Auth boundary violated
Trust-domain boundary — untrusted cross-origin browser context (and any unauthenticated network caller) crossing into the trusted server-state-mutating GitLab API surface that the operator's PAT backs. Respected-here: nothing. The transport carries no Authorization check, no origin allowlist, no session-binding to the originating client, and no host restriction. Ignored-there: the SSE handler at src/transport.ts accepts an arbitrary Origin (since Access-Control-Allow-Origin: *), opens a session, and the matching POST /messages?sessionId=... proxies tool calls — including delete_repository, push_files, update_repository_settings — to the GitLab API using the operator's PAT. Any web page the operator visits while the server runs can drive the full 86-tool surface via cross-origin fetch.
The roadmap in README.md at line 190 includes - [ ] SAML/OAuth3 authentication — confirming the maintainers are already tracking this gap. The issue is disclosure of impact in the interim: operators who follow the README's SSE setup instructions and don't see an auth requirement in the docs may reasonably assume the transport is safe to use on a network-accessible host.
CVSS 4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N — ~6.3 (Medium). AT:P reflects the USE_SSE=true precondition. When that precondition is met, the effective severity for those deployments is High — full GitLab PAT access without authentication. The Medium CVSS is the aggregate across all deployments; for any operator who has activated SSE mode (which the README promotes as a feature), the finding is functionally High.
Fix — four concrete changes:
- Require
MCP_GITLAB_AUTH_TOKENas a startup precondition whenUSE_SSE=true. If the env var is unset, the server should exit with a clear message before the HTTP server starts:
if (process.env.USE_SSE === 'true') {
if (!process.env.MCP_GITLAB_AUTH_TOKEN) {
console.error(
'ERROR: MCP_GITLAB_AUTH_TOKEN must be set when USE_SSE=true. ' +
'SSE transport without authentication exposes all GitLab tools to unauthenticated callers.'
);
process.exit(1);
}
}
The token check in src/transport.ts validates it on every request: ``typescript const authToken = process.env.MCP_GITLAB_AUTH_TOKEN; if (authToken) { const provided = req.headers['authorization']?.replace(/^Bearer /, ''); if (provided !== authToken) { res.writeHead(401); res.end(JSON.stringify({ error: 'Unauthorized' })); return; } } ``
- Bind to
127.0.0.1by default for the SSE transport rather than0.0.0.0. An explicitMCP_GITLAB_HOST=0.0.0.0flag with a startup banner warning can expose it to the network for operators who need that — but the safe default should be loopback-only.
- Replace the wildcard
Access-Control-Allow-Origin: *with a localhost-only default. When network exposure is intentional (explicit flag + auth token set), an explicitCORS_ORIGINSallowlist should be required.
- The SAML/OAuth3 roadmap item is the right long-term direction. In the interim — before that ships — the three changes above are entirely in the existing codebase with no new dependencies.
---
No prior security advisories, CVEs, or public security issues exist for this package — a search of the repository issue list and npm advisory database did not yield any duplicate issues.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The mcp-gitlab-server SSE transport lacks authentication and uses wildcard CORS, allowing unauthenticated access to all 86 GitLab tools including destructive operations.
Vulnerability
The mcp-gitlab-server, an MCP bridge to the GitLab API [1], exposes an SSE HTTP transport when configured with USE_SSE=true. In src/transport.ts, the server sets wildcard CORS headers (Access-Control-Allow-Origin: *) and binds to all network interfaces (0.0.0.0). The two endpoints, GET /sse and POST /messages?sessionId=<id>, require no authentication, allowing any reachable client to interact with the server.
Exploitation
An attacker on the same network (LAN, cloud instance) or via a malicious website (due to wildcard CORS) can open an SSE connection and send MCP messages. The browser-tab vector is particularly concerning: any web page the operator visits while the server runs can make cross-origin requests without user interaction. No credentials are needed to invoke the server's tools.
Impact
The attacker gains full use of all 86 GitLab tools supported by the server, operating under the authority of the operator's GITLAB_PERSONAL_ACCESS_TOKEN. This includes destructive operations such as delete_repository, delete_group, push_files, create_merge_request, and update_repository_settings. The PAT is not exfiltrated, but every API call it authorizes is available to the unauthenticated caller.
Mitigation
The maintainers have acknowledged the authentication gap on their roadmap, and the issue is documented in the security advisory [2]. Until a fix is released, users should avoid enabling the SSE transport or ensure it is not exposed to untrusted networks. Using a firewall to restrict access to trusted IPs is a temporary workaround.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
@yoda.digital/gitlab-mcp-servernpm | < 0.6.0 | 0.6.0 |
Affected products
1- Range: < 0.6.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.