Ad

CVE-2026-32111

MEDIUM CVSS 3.1: 5.3 EPSS 0.04%
Updated Mar 17, 2026
Homeassistant-Ai
Parameter Value
CVSS 5.3 (MEDIUM)
Affected Versions before 7.0.0
Fixed In 7.0.0
Type CWE-918 (Server-Side Request Forgery (SSRF))
Vendor Homeassistant-Ai
Public PoC No

ha-mcp is a Home Assistant MCP Server. Prior to 7.0.0, the ha-mcp OAuth consent form (beta feature) accepts a user-supplied ha_url and makes a server-side HTTP request to {ha_url}/api/config with no URL validation. An unauthenticated attacker can submit arbitrary URLs to perform internal network reconnaissance via an error oracle.

Two additional code paths in OAuth tool calls (REST and WebSocket) are affected by the same primitive. The primary deployment method (private URL with pre-configured HOMEASSISTANT_TOKEN) is not affected. This vulnerability is fixed in 7.0.0.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
Low
Partial data leak
Integrity
None
No data modification
Availability
None
No disruption

CVSS Vector v3.1

Vulnerable Products 1

Configuration From (including) Up to (excluding)
Homeassistant-Ai Home_Assistant_Mcp_Server
cpe:2.3:a:homeassistant-ai:home_assistant_mcp_server:*:*:*:*:*:*:*:*
7.0.0

Related Vulnerabilities