FKIE_CVE-2026-26118

Vulnerability from fkie_nvd - Published: 2026-03-10 18:18 - Updated: 2026-03-13 20:12

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08F2F33D-68BC-40BD-9945-9DAC13516B3F",
              "versionEndExcluding": "2.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "FE4BB62F-D65C-4BD7-A977-560951121A31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "E25804B6-4EBC-484C-AA53-5F36A125F63C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "60995316-44CA-4789-B168-BD759D3FDC7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "69049E0E-CFEE-4051-BE1A-E6A10A346986",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta13:*:*:*:*:*:*",
              "matchCriteriaId": "0E72117C-2C98-424A-BF6E-78553201F3AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta14:*:*:*:*:*:*",
              "matchCriteriaId": "AE81B2AA-87D7-41B3-934E-F06EB9973B7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta15:*:*:*:*:*:*",
              "matchCriteriaId": "A733A0B0-6D86-4CEF-A594-214195F8A40E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta16:*:*:*:*:*:*",
              "matchCriteriaId": "1A0E69CE-C717-407D-84BA-8CC241F179B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "C7D01823-C2A0-4FB2-B0A9-53CD02FFDFFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "F27295F4-18D0-428E-A2F1-77B3209B6183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B88758F0-AE0F-4644-A2D0-EAB69F04B2AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D1C2790F-D5F5-495A-9A70-01D0A69FECDF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "F30CE925-8322-43B4-B634-B08F0D69DF19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "640182FA-C461-46A2-BDEE-0785DCA7C26B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "F7F3A643-AC07-4EC7-A4E2-DD5B0937D728",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:microsoft:azure_mcp_server:2.0.0:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "B304FD54-1827-4401-8DA9-C1D982667DBB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Server-side request forgery (ssrf) in Azure MCP Server allows an authorized attacker to elevate privileges over a network."
    },
    {
      "lang": "es",
      "value": "Falsificaci\u00f3n de petici\u00f3n del lado del servidor (SSRF) en Azure MCP Server permite a un atacante autorizado elevar privilegios a trav\u00e9s de una red."
    }
  ],
  "id": "CVE-2026-26118",
  "lastModified": "2026-03-13T20:12:47.740",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "secure@microsoft.com",
        "type": "Secondary"
      }
    ]
  },
  "published": "2026-03-10T18:18:41.180",
  "references": [
    {
      "source": "secure@microsoft.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26118"
    }
  ],
  "sourceIdentifier": "secure@microsoft.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-918"
        }
      ],
      "source": "secure@microsoft.com",
      "type": "Secondary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…