FKIE_CVE-2026-26118
Vulnerability from fkie_nvd - Published: 2026-03-10 18:18 - Updated: 2026-03-13 20:12
Severity ?
Summary
Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network.
References
| URL | Tags | ||
|---|---|---|---|
| secure@microsoft.com | https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26118 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| microsoft | azure_mcp_server | * | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 | |
| microsoft | azure_mcp_server | 2.0.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08F2F33D-68BC-40BD-9945-9DAC13516B3F",
"versionEndExcluding": "2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "FE4BB62F-D65C-4BD7-A977-560951121A31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta10:*:*:*:*:*:*",
"matchCriteriaId": "E25804B6-4EBC-484C-AA53-5F36A125F63C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta11:*:*:*:*:*:*",
"matchCriteriaId": "60995316-44CA-4789-B168-BD759D3FDC7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta12:*:*:*:*:*:*",
"matchCriteriaId": "69049E0E-CFEE-4051-BE1A-E6A10A346986",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta13:*:*:*:*:*:*",
"matchCriteriaId": "0E72117C-2C98-424A-BF6E-78553201F3AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta14:*:*:*:*:*:*",
"matchCriteriaId": "AE81B2AA-87D7-41B3-934E-F06EB9973B7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta15:*:*:*:*:*:*",
"matchCriteriaId": "A733A0B0-6D86-4CEF-A594-214195F8A40E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta16:*:*:*:*:*:*",
"matchCriteriaId": "1A0E69CE-C717-407D-84BA-8CC241F179B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta2:*:*:*:*:*:*",
"matchCriteriaId": "C7D01823-C2A0-4FB2-B0A9-53CD02FFDFFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta3:*:*:*:*:*:*",
"matchCriteriaId": "F27295F4-18D0-428E-A2F1-77B3209B6183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta4:*:*:*:*:*:*",
"matchCriteriaId": "B88758F0-AE0F-4644-A2D0-EAB69F04B2AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta5:*:*:*:*:*:*",
"matchCriteriaId": "D1C2790F-D5F5-495A-9A70-01D0A69FECDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta6:*:*:*:*:*:*",
"matchCriteriaId": "F30CE925-8322-43B4-B634-B08F0D69DF19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta7:*:*:*:*:*:*",
"matchCriteriaId": "640182FA-C461-46A2-BDEE-0785DCA7C26B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta8:*:*:*:*:*:*",
"matchCriteriaId": "F7F3A643-AC07-4EC7-A4E2-DD5B0937D728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta9:*:*:*:*:*:*",
"matchCriteriaId": "B304FD54-1827-4401-8DA9-C1D982667DBB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network."
},
{
"lang": "es",
"value": "Falsificaci\u00f3n de petici\u00f3n del lado del servidor (SSRF) en Azure MCP Server permite a un atacante autorizado elevar privilegios a trav\u00e9s de una red."
}
],
"id": "CVE-2026-26118",
"lastModified": "2026-03-13T20:12:47.740",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
},
"published": "2026-03-10T18:18:41.180",
"references": [
{
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
],
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26118"
}
],
"sourceIdentifier": "secure@microsoft.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-918"
}
],
"source": "secure@microsoft.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…