CVE-2026-7147: JoeCastrom mcp-chat-studio SSRF Vulnerability Publicly Exploitable
A critical server-side request forgery (SSRF) vulnerability, identified as CVE-2026-7147, has been discovered in JoeCastrom mcp-chat-studio up to version 1.5.0. According to the National Vulnerability Database, this flaw resides within the LLM Models API component, specifically affecting the server/routes/llm.js file. Manipulation of the req.query.base_url argument allows for remote exploitation, enabling attackers to force the server to make requests to arbitrary domains.
The National Vulnerability Database highlights that the exploit for this vulnerability is now publicly available, significantly increasing the risk of widespread attacks. Despite early notification through an issue report, the project maintainers have not yet responded or provided a patch. With a CVSS score of 7.3 (HIGH), this issue represents a serious threat, potentially leading to information disclosure, port scanning of internal networks, or even access to internal services.
Attackers will leverage the public exploit to pivot into internal infrastructure, bypassing perimeter defenses. Defenders should assume active exploitation is imminent, especially given the lack of a vendor response. The attacker’s calculus here is simple: unpatched, exposed systems are low-hanging fruit for initial access and reconnaissance.
What This Means For You
- If your organization uses JoeCastrom mcp-chat-studio, you are exposed. This is a high-severity SSRF with a public exploit. Immediately assess your exposure and consider isolating or removing any instances of mcp-chat-studio until a patch is available. Audit network logs for suspicious outbound connections from systems running this software, as attackers can use SSRF to scan internal networks or access metadata services.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7147: mcp-chat-studio LLM API SSRF via base_url parameter
title: CVE-2026-7147: mcp-chat-studio LLM API SSRF via base_url parameter
id: scw-2026-04-27-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-7147 by identifying requests to the '/llm.js' endpoint with a 'base_url' query parameter, indicative of a Server-Side Request Forgery (SSRF) vulnerability in JoeCastrom mcp-chat-studio.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7147/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/llm.js'
cs-uri-query|contains:
- 'base_url='
cs-method|exact:
- 'GET'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7147 | SSRF | JoeCastrom mcp-chat-studio up to 1.5.0 |
| CVE-2026-7147 | SSRF | server/routes/llm.js in LLM Models API component |
| CVE-2026-7147 | SSRF | Manipulation of argument req.query.base_url |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.