fetch-mcp v1.0.2 and before is vulnerable to Server-Side Request Forgery (SSRF) vulnerability, which allows attackers to bypass private IP validation and access internal network resources.
References
| Link | Resource |
|---|---|
| https://github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-65513.md | Exploit Third Party Advisory |
| https://thorn-pheasant-6d8.notion.site/fetch-mcp-2853daf7b44180029ca5d56e03195736 | Exploit Third Party Advisory |
| https://github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-65513.md | Exploit Third Party Advisory |
Configurations
History
02 Jan 2026, 16:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:zcaceres:fetch_mcp_server:*:*:*:*:*:*:*:* | |
| First Time |
Zcaceres
Zcaceres fetch Mcp Server |
30 Dec 2025, 16:33
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Zach
Zach fetch-mcp |
|
| CPE | cpe:2.3:a:zach:fetch-mcp:*:*:*:*:*:*:*:* |
19 Dec 2025, 19:07
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-65513.md - Exploit, Third Party Advisory | |
| References | () https://thorn-pheasant-6d8.notion.site/fetch-mcp-2853daf7b44180029ca5d56e03195736 - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:zcaceres:fetch-mcp:*:*:*:*:*:*:*:* | |
| First Time |
Zcaceres fetch-mcp
Zcaceres |
11 Dec 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/Team-Off-course/MCP-Server-Vuln-Analysis/blob/main/CVE-2025-65513.md - | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CWE | CWE-918 |
09 Dec 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 22:16
Updated : 2026-01-02 16:03
NVD link : CVE-2025-65513
Mitre link : CVE-2025-65513
CVE.ORG link : CVE-2025-65513
JSON object : View
Products Affected
zcaceres
- fetch_mcp_server
CWE
CWE-918
Server-Side Request Forgery (SSRF)
