CVE-2026-7094: High-Severity SSRF in ShadowCloneLabs GlutamateMCPServers
The National Vulnerability Database has disclosed CVE-2026-7094, a high-severity Server-Side Request Forgery (SSRF) vulnerability affecting ShadowCloneLabs GlutamateMCPServers up to commit e2de73280b01e5d943593dd1aa2c01c5b9112f78. This flaw, rated 7.3 CVSSv3.1, resides in the src/puppeteer/index.ts file’s puppeteer_navigate component. Attackers can remotely manipulate the url argument, leading to SSRF.
SSRF vulnerabilities allow attackers to compel the server-side application to make requests to an arbitrary domain chosen by the attacker. This can expose internal services, sensitive data, or even facilitate further attacks like port scanning, bypassing firewalls, or executing commands if combined with other vulnerabilities. The National Vulnerability Database notes that an exploit for this vulnerability has been publicly disclosed, increasing the urgency for affected organizations.
ShadowCloneLabs utilizes a rolling release system, and specific affected version information is not publicly disclosed. Despite early notification via an issue report, the project has not yet responded to the vulnerability. This lack of communication and clear patching guidance leaves users in a precarious position, requiring proactive defense and careful monitoring.
What This Means For You
- If your organization uses ShadowCloneLabs GlutamateMCPServers, immediately identify if your deployment is based on a vulnerable commit prior to e2de73280b01e5d943593dd1aa2c01c5b9112f78. Given the public exploit and lack of vendor response, assume compromise potential and implement network segmentation, egress filtering, and robust logging to detect and mitigate SSRF attempts. Prioritize patching or isolating these instances.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7094: SSRF via puppeteer_navigate url parameter
title: CVE-2026-7094: SSRF via puppeteer_navigate url parameter
id: scw-2026-04-27-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2026-7094 by identifying requests to the puppeteer_navigate component with a 'url=' parameter in the query string. This is the specific vulnerability vector for SSRF in ShadowCloneLabs GlutamateMCPServers.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7094/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/puppeteer_navigate'
cs-uri-query|contains:
- 'url='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7094 | SSRF | ShadowCloneLabs GlutamateMCPServers up to commit e2de73280b01e5d943593dd1aa2c01c5b9112f78 |
| CVE-2026-7094 | SSRF | Vulnerable component: puppeteer_navigate |
| CVE-2026-7094 | SSRF | Vulnerable file: src/puppeteer/index.ts |
| CVE-2026-7094 | SSRF | Vulnerable argument: url |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 10:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.