CVE-2025-59155 is a low severity vulnerability with a CVSS score of 0.0. No known exploits currently, and patches are available.
Very low probability of exploitation
EPSS predicts the probability of exploitation in the next 30 days based on real-world threat data, complementing CVSS severity scores with actual risk assessment.
A Server-Side Request Forgery (SSRF) vulnerability that affects all users running the HackMD MCP server in HTTP mode. Attackers could exploit this vulnerability by passing arbitrary hackmdApiUrl values through HTTP headers (Hackmd-Api-Url) or base64-encoded JSON query parameters. This allows malicious users to:
The vulnerability affects the HTTP transport mode specifically - stdio mode is not impacted as it only accepts requests from stdio.
The vulnerability has been patched in version 1.5.0. Users should:
ALLOWED_HACKMD_API_URLS environment variable to restrict allowed HackMD API endpointshttps://api.hackmd.io/v1)Example configuration:
ALLOWED_HACKMD_API_URLS=https://api.hackmd.io/v1,https://your-hackmd-instance.com/api/v1
Users can mitigate this vulnerability without upgrading by:
TRANSPORT=stdio or remove the TRANSPORT environment variable to disable HTTP mode entirelyHackmd-Api-Url header and the base64-encoded JSON config query parameter to prevent malicious hackmdApiUrl valuesPlease cite this page when referencing data from Strobes VI. Proper attribution helps support our vulnerability intelligence research.