1. Executive Summary
What: A high-severity server-side request forgery (SSRF) vulnerability exists in mcp-atlassian, a Model Context Protocol (MCP) server for Atlassian Jira and Confluence, affecting all versions prior to 0.17.0 (GHSA-7r34-79r5-rcc9). Tracked as CVE-2026-27826 with a CNA-submitted CVSS base score of 8.2 High (NVD status: Awaiting Analysis), the vulnerability allows an unauthenticated attacker who can reach the MCP server's HTTP endpoint to force outbound requests to arbitrary attacker-controlled URLs by injecting values into the X-Atlassian-Jira-Url or X-Atlassian-Confluence-Url headers (GHSA-7r34-79r5-rcc9). Exploitation requires that HTTP transport be enabled via --transport streamable-http or --transport sse; deployments using the default stdio transport are not affected (GHSA-7r34-79r5-rcc9).
So What: The vulnerability enables three distinct attack outcomes confirmed by the advisory: internal network reconnaissance, cloud credential theft via instance metadata endpoints, and prompt injection through attacker-controlled API responses injected into LLM context (GHSA-7r34-79r5-rcc9). The flaw exists at the HTTP middleware layer rather than in tool-level code, meaning standard code review of MCP tool implementations would not detect it (GHSA-7r34-79r5-rcc9). This represents an early example of a security flaw in the MCP server ecosystem, a rapidly expanding category of AI agent infrastructure where middleware authentication handling introduces a distinct security boundary that has not been systematically audited across the ecosystem (RAXE assessment).
Now What: Organisations running mcp-atlassian with HTTP transport should upgrade to version 0.17.0 or later immediately (GHSA-7r34-79r5-rcc9, PyPI). Security teams should audit all deployed MCP servers for similar header-injection patterns, particularly where middleware processes custom HTTP headers to configure backend service URLs (RAXE assessment).
2. Risk Rating
| Dimension | Rating | Detail |
|---|---|---|
| Severity | HIGH | CVSS 8.2 High: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N (CNA-submitted via GHSA-7r34-79r5-rcc9; NVD status: Awaiting Analysis) |
| Urgency | MEDIUM | Patch available (0.17.0, released 2026-02-24); no confirmed in-the-wild exploitation; EPSS 0.00037 / 10.8th percentile (FIRST.org EPSS, 2026-03-11) |
| Scope | CHANGED (S:C) |
The SSRF allows the attacker to redirect server-side requests to systems beyond the MCP server itself, including internal services and cloud metadata endpoints (GHSA-7r34-79r5-rcc9) |
| Confidence | HIGH | CVE assigned, vendor advisory published, patch released, fix commit available (GHSA-7r34-79r5-rcc9, NVD) |
| Business Impact | HIGH | Cloud credential theft via SSRF to instance metadata; internal network reconnaissance; chained prompt injection into LLM context (GHSA-7r34-79r5-rcc9). Impact is bounded by the AV:A (adjacent network) attack vector; the attacker must be able to reach the MCP server's HTTP interface (RAXE assessment) |
CVSS Score Provenance
The NVD entry for CVE-2026-27826 lists a CNA-submitted CVSS base score of 8.2 with type "Secondary" (source: security-advisories@github.com) (NVD). NVD has not completed its own analysis (vulnStatus: Awaiting Analysis) and no NVD Primary score has been assigned (NVD). The CVSS score cited throughout this publication is the CNA-submitted score from the GHSA advisory and has not been independently assessed by NVD.
EPSS: 0.00037 (10.8th percentile), indicating a low current probability of exploitation in the wild (FIRST.org EPSS, as of 2026-03-16; revalidate at publication time).
3. Affected Products
| Product | Registry | Affected Versions | Fixed Version | Fix Commit | Source |
|---|---|---|---|---|---|
| mcp-atlassian | PyPI | < 0.17.0 |
0.17.0 |
sooperset/mcp-atlassian@5cd697d |
GHSA-7r34-79r5-rcc9 |
Package details: mcp-atlassian is an open-source Model Context Protocol server enabling AI integration with Atlassian Jira and Confluence (PyPI). The package is maintained by sooperset and released under the MIT licence (PyPI). Version 0.17.0 was published to PyPI on 2026-02-24 and requires Python >= 3.10 (PyPI).
Am I Affected?
- Check if the package is installed:
pip show mcp-atlassianor search your environment's dependency list formcp-atlassian - Check the installed version:
pip show mcp-atlassian | grep Version; any version below0.17.0is vulnerable (GHSA-7r34-79r5-rcc9) - Check the transport mode: review the startup command or configuration for
--transport streamable-httpor--transport sse; only HTTP transport deployments are affected (GHSA-7r34-79r5-rcc9) - If using stdio transport (the default), the vulnerability is not exploitable regardless of version (
GHSA-7r34-79r5-rcc9) - Check network exposure: determine whether the MCP server's HTTP endpoint is reachable from untrusted network segments; the CVSS vector specifies
AV:A(adjacent network) (GHSA-7r34-79r5-rcc9)
4. Abstract
This report covers CVE-2026-27826, an SSRF vulnerability in mcp-atlassian, the Model Context Protocol server for Atlassian Jira and Confluence (GHSA-7r34-79r5-rcc9). The vulnerability spans two code layers: HTTP middleware that extracts custom service URL headers without validation (main.py:436-448) and dependency provider logic that uses the untrusted URL to instantiate API clients and immediately trigger outbound HTTP requests (dependencies.py:189-217 for Jira, dependencies.py:341-393 for Confluence) (GHSA-7r34-79r5-rcc9).
When an attacker sends an HTTP request containing an X-Atlassian-Jira-Url or X-Atlassian-Confluence-Url header with a corresponding personal access token header but without an Authorization header, the middleware interprets this as a PAT authentication flow and passes the attacker-controlled URL to the dependency provider, which constructs an API client and calls get_current_user_account_id(), triggering an outbound HTTP request to the attacker's URL (GHSA-7r34-79r5-rcc9). The advisory confirms three impact categories: internal network reconnaissance, cloud credential theft via instance metadata endpoints, and prompt injection through attacker-controlled responses injected into LLM context (GHSA-7r34-79r5-rcc9).
The vulnerability is notable as a concrete example of security flaws in MCP server middleware, a component class that sits between the transport layer and AI tool implementations and is not covered by tool-level security auditing (RAXE assessment).
5. Key Findings
-
SSRF via unvalidated service URL headers: The
mcp-atlassianHTTP middleware acceptsX-Atlassian-Jira-UrlandX-Atlassian-Confluence-Urlheaders without any allowlist verification or private IP range checks, passing attacker-controlled URLs directly to API client constructors (GHSA-7r34-79r5-rcc9). -
Middleware-layer vulnerability: The flaw exists in the HTTP middleware and dependency injection code (
main.py:436-448,dependencies.py:189-217,dependencies.py:341-393), not in the MCP tool handlers themselves. This means tool-level code review would not identify the vulnerability (GHSA-7r34-79r5-rcc9). -
Three confirmed impact categories: The advisory explicitly confirms internal network reconnaissance, cloud credential theft (via instance metadata endpoints such as AWS
IMDSv1), and prompt injection via poisoned API responses (GHSA-7r34-79r5-rcc9). -
Chained SSRF-to-prompt-injection path: Once the attacker-controlled fetcher is cached in request state, all subsequent Jira/Confluence tool responses for that session originate from the attacker's server, allowing injection of malicious content into the LLM context as if it were legitimate Atlassian data (
GHSA-7r34-79r5-rcc9). The actual impact of this prompt injection depends on how the downstream LLM framework handles tool responses; additional sanitisation layers may mitigate the injection (RAXE assessment). -
Transport prerequisite limits exposure: Only HTTP transport deployments (
--transport streamable-httpor--transport sse) are affected; stdio deployments are immune (GHSA-7r34-79r5-rcc9). The CVSS vector specifiesAV:A(adjacent network), further limiting the attack surface to hosts that can reach the MCP server's listening interface (GHSA-7r34-79r5-rcc9).
6. Attack Flow
The following attack flow describes only behaviour confirmed in the GHSA advisory (GHSA-7r34-79r5-rcc9).
ATTACKER (adjacent network)
|
| 1. HTTP request to MCP endpoint
| Headers:
| X-Atlassian-Jira-Url: http://attacker.example/
| X-Atlassian-Jira-Personal-Token: <any-value>
| (no Authorization header)
v
+----------------------------+
| mcp-atlassian HTTP server |
| (transport: streamable- |
| http or sse) |
+----------------------------+
|
| 2. Middleware (main.py:436-448)
| Detects service URL header
| + no Authorization header
| -> sets auth_type = "pat"
| -> passes URL to dependency
| provider unvalidated
v
+----------------------------+
| Dependency Provider |
| (dependencies.py:189-217 |
| or 341-393) |
+----------------------------+
|
| 3. Constructs JiraConfig /
| ConfluenceConfig with
| attacker URL
|
| 4. Calls get_current_user_
| account_id() -> outbound
| HTTP request to attacker URL
v
+-------------------------------+
| ATTACKER-CONTROLLED SERVER |
+-------------------------------+
| | |
v v v
Impact A Impact B Impact C
Internal Cloud Prompt
Recon Cred Injection
Theft via LLM
Context
Impact A: Internal Reconnaissance. The MCP server acts as an SSRF proxy, enabling enumeration of internal services, open ports, and network topology from the server's network position (GHSA-7r34-79r5-rcc9).
Impact B: Cloud Credential Theft. On cloud-hosted instances, the SSRF can target instance metadata endpoints (e.g., AWS IMDSv1 at 169.254.169.254) to exfiltrate IAM role credentials, granting the attacker access to cloud resources permitted by that role (GHSA-7r34-79r5-rcc9).
Impact C: Prompt Injection. The attacker-controlled URL response is processed as if it were a legitimate Atlassian API response; once the fetcher is cached in request state, all tool responses for that session originate from the attacker's server, enabling injection of malicious content into the LLM context (GHSA-7r34-79r5-rcc9). The downstream impact of this injection depends on how the LLM framework processes tool responses; frameworks with response sanitisation may limit the effectiveness of the injection (RAXE assessment).
7. Technical Details
7.1 Vulnerability Mechanism
The vulnerability spans two code layers within the mcp-atlassian server (GHSA-7r34-79r5-rcc9):
Middleware header extraction (main.py:436-448): When the middleware receives an HTTP request containing X-Atlassian-Jira-Url (or X-Atlassian-Confluence-Url) headers without an Authorization header, it sets the authentication type to pat (personal access token) and passes the untrusted URL value to the dependency provider without allowlist verification or private IP range checks (GHSA-7r34-79r5-rcc9).
Dependency provider instantiation (Jira: dependencies.py:189-217; Confluence: dependencies.py:341-393): The dependency provider uses the attacker-supplied header value directly to instantiate a JiraConfig (or ConfluenceConfig) object and immediately invokes get_current_user_account_id(), which makes an outbound HTTP request to the attacker-controlled URL (GHSA-7r34-79r5-rcc9). The resulting fetcher object is cached in request state for subsequent tool calls in that session (GHSA-7r34-79r5-rcc9).
7.2 Attack Prerequisites
All four conditions must be met for exploitation (GHSA-7r34-79r5-rcc9):
- The MCP server is running with HTTP transport enabled (
--transport streamable-httpor--transport sse) - The HTTP request includes
X-Atlassian-Jira-UrlorX-Atlassian-Confluence-Urlwith an attacker-controlled value - The HTTP request includes the corresponding personal access token header (
X-Atlassian-Jira-Personal-TokenorX-Atlassian-Confluence-Personal-Token) with any non-empty value - The HTTP request does not include an
Authorizationheader; its absence triggers the PAT code path
7.3 Three Impact Categories
Internal network reconnaissance (GHSA-7r34-79r5-rcc9): The MCP server functions as an SSRF proxy, enabling "reconnaissance of internal services (databases, internal APIs, microservices) not directly reachable from outside the network" from the server's network position.
Cloud credential theft (GHSA-7r34-79r5-rcc9): On cloud-hosted instances, the advisory states that "any network-reachable attacker can potentially steal the server's IAM role credentials via the instance metadata service, gaining full access to all cloud resources that role permits" by targeting 169.254.169.254.
Prompt injection via poisoned API response (GHSA-7r34-79r5-rcc9): The advisory describes that "once the attacker-controlled fetcher is cached in request.state, all Jira tool responses for that session originate from the attacker's server. The attacker can return crafted API responses containing LLM instructions, injecting those instructions into the AI agent's context as if they were legitimate Jira data."
7.4 CVSS Vector Analysis
| Metric | Value | Interpretation |
|---|---|---|
| Attack Vector (AV) | Adjacent (A) | Attacker must reach the MCP server's HTTP interface, typically limited to the local network segment (GHSA-7r34-79r5-rcc9) |
| Attack Complexity (AC) | Low (L) | No special conditions or race conditions required (GHSA-7r34-79r5-rcc9) |
| Privileges Required (PR) | None (N) | Unauthenticated; the attack exploits the absence of an Authorization header (GHSA-7r34-79r5-rcc9) |
| User Interaction (UI) | None (N) | No user action required (GHSA-7r34-79r5-rcc9) |
| Scope (S) | Changed (C) | The SSRF redirects requests to systems beyond the vulnerable MCP server (GHSA-7r34-79r5-rcc9) |
| Confidentiality (C) | High (H) | Cloud credential theft, internal service enumeration (GHSA-7r34-79r5-rcc9) |
| Integrity (I) | Low (L) | Prompt injection via poisoned responses (GHSA-7r34-79r5-rcc9) |
| Availability (A) | None (N) | No denial-of-service impact described (GHSA-7r34-79r5-rcc9) |
Authentication language: The CVSS vector specifies PR:N, confirming that the vulnerability is exploitable by an unauthenticated attacker. The AV:A (adjacent network) vector indicates that the attack surface is limited to hosts that can reach the MCP server's HTTP interface; this is distinct from AV:N (network) and meaningfully constrains the attacker population (GHSA-7r34-79r5-rcc9).
7.5 Default Deployment Configuration
The GHSA advisory notes that the default deployment configuration uses HOST=0.0.0.0, which exposes the MCP server to all network interfaces (GHSA-7r34-79r5-rcc9). Organisations that have not restricted the listening interface may have broader exposure than the AV:A vector implies (RAXE assessment).
8. Confidence & Validation
Assessment Confidence: High
| Aspect | Status | Detail |
|---|---|---|
| Vendor Advisory | Published | GHSA-7r34-79r5-rcc9, published 2026-02-24 (GHSA-7r34-79r5-rcc9) |
| CVE Assigned | Yes | CVE-2026-27826, published to NVD 2026-03-10 (NVD) |
| NVD Analysis | Awaiting Analysis | vulnStatus: Awaiting Analysis; CVSS score is CNA-submitted (type: Secondary), not NVD Primary (NVD) |
| EPSS | 0.00037 / 10.8th percentile | Low exploitation probability (FIRST.org EPSS, 2026-03-11) |
| Patch Available | Yes | 0.17.0 released 2026-02-24 (PyPI) |
| Fix Commit | Available | sooperset/mcp-atlassian@5cd697d (GHSA-7r34-79r5-rcc9, NVD) |
| PoC Available | Advisory-included | The GHSA advisory includes a working proof-of-concept with a Python listener script and HTTP request sequence demonstrating the full SSRF chain (GHSA-7r34-79r5-rcc9) |
| Exploited in Wild | Not confirmed | No evidence of in-the-wild exploitation at time of writing (RAXE assessment) |
Admiralty Grade: B2: Usually reliable source, corroborated information.
Key Assumptions:
| # | Assumption | Confidence | Impact if Wrong |
|---|---|---|---|
| 1 | HTTP transport is not the default configuration, limiting exposed attack surface | Medium | If HTTP is default in common deployment guides, more instances are affected than assessed |
| 2 | The AV:A vector is accurate; most MCP servers listen only on localhost or internal interfaces |
Medium | The advisory notes default HOST=0.0.0.0; if commonly used, exposure is broader |
| 3 | Prompt injection impact requires the LLM to process the SSRF response without additional validation | High | If LLM frameworks sanitise tool responses, the prompt injection chain is broken |
9. Detection Signatures
Four Sigma detection rules are provided, covering delivery telemetry, outbound SSRF indicators, prompt injection hunting, and posture assessment.
Rule 1: SSRF via Injected Atlassian Service URL Headers
Classification: Delivery telemetry
CVE: CVE-2026-27826
CWE: CWE-918
title: MCP Atlassian SSRF via Injected Service URL Header
id: raxe-2026-034-r1
status: experimental
description: >
Detects HTTP requests to an mcp-atlassian server containing
X-Atlassian-Jira-Url or X-Atlassian-Confluence-Url headers without
an Authorization header. This combination triggers the PAT
authentication code path, which uses the untrusted header value to
make outbound requests without URL validation
(GHSA-7r34-79r5-rcc9).
references:
- https://github.com/sooperset/mcp-atlassian/security/advisories/GHSA-7r34-79r5-rcc9
- https://nvd.nist.gov/vuln/detail/CVE-2026-27826
author: RAXE Labs
date: 2026-03-11
tags:
- attack.initial_access
- cve.2026.27826
- cwe.918
logsource:
category: webserver
product: any
detection:
selection_jira:
cs-header-x-atlassian-jira-url|exists: true
cs-header-x-atlassian-jira-personal-token|exists: true
selection_confluence:
cs-header-x-atlassian-confluence-url|exists: true
cs-header-x-atlassian-confluence-personal-token|exists: true
filter_no_auth:
cs-header-authorization: ''
condition: (selection_jira or selection_confluence) and filter_no_auth
falsepositives:
- Legitimate MCP client connections using header-based configuration without Bearer auth
- Requires log source that captures custom HTTP request headers
level: medium
Rule 2: MCP Server Outbound Request to Internal or Metadata Endpoint
Classification: Delivery telemetry
CVE: CVE-2026-27826
CWE: CWE-918
Detection gap: This rule covers SSRF to internal/metadata targets but does not detect outbound SSRF to attacker-controlled external URLs. The advisory PoC demonstrates SSRF to an external listener, which triggers GET /rest/api/2/myself to the attacker's server (GHSA-7r34-79r5-rcc9). Detecting external SSRF requires environment-specific tuning (allowlisting the configured Atlassian base URL and alerting on outbound /rest/api/2/myself requests to non-configured domains), which is beyond the scope of a generic Sigma rule (RAXE assessment). See Section 11 Network Indicators for the external SSRF pattern.
title: MCP Atlassian SSRF Outbound Request to Internal Network
id: raxe-2026-034-r2
status: experimental
description: >
Detects outbound HTTP requests from an mcp-atlassian server process
targeting private IP ranges (RFC 1918), localhost, or cloud metadata
endpoints. The SSRF vulnerability allows attackers to force outbound
requests to arbitrary URLs, including internal services and cloud
credential endpoints (GHSA-7r34-79r5-rcc9). Note: this rule does
not detect SSRF to external attacker-controlled URLs -- see the
detection gap note above (RAXE assessment).
Requires network monitoring or egress proxy logs that can identify
MCP server process traffic (RAXE assessment).
references:
- https://github.com/sooperset/mcp-atlassian/security/advisories/GHSA-7r34-79r5-rcc9
- https://nvd.nist.gov/vuln/detail/CVE-2026-27826
author: RAXE Labs
date: 2026-03-11
tags:
- attack.lateral_movement
- cve.2026.27826
- cwe.918
logsource:
category: proxy
product: any
detection:
selection_private:
r-dns|startswith:
- '10.'
- '172.16.'
- '172.17.'
- '172.18.'
- '172.19.'
- '172.20.'
- '172.21.'
- '172.22.'
- '172.23.'
- '172.24.'
- '172.25.'
- '172.26.'
- '172.27.'
- '172.28.'
- '172.29.'
- '172.30.'
- '172.31.'
- '192.168.'
- '127.'
selection_metadata:
r-dns|contains: '169.254.169.254'
condition: selection_private or selection_metadata
falsepositives:
- Legitimate mcp-atlassian connections to internal Jira/Confluence instances
- Requires correlation with mcp-atlassian process identity to reduce noise
level: medium
Rule 3: Anomalous Atlassian API Response Content in MCP Context (Hunting)
Classification: Hunting rule
CVE: CVE-2026-27826
title: Hunting -- Anomalous Content in MCP Atlassian Tool Response
id: raxe-2026-034-r3
status: experimental
description: >
Hunting rule to detect potential prompt injection via SSRF-poisoned
Atlassian API responses. When an attacker controls the URL via the
SSRF, the response is processed as a legitimate Atlassian API
response and injected into LLM context (GHSA-7r34-79r5-rcc9).
This rule looks for common prompt injection patterns in MCP tool
responses. Requires application-level logging of MCP tool
responses, which is not standard (RAXE assessment).
references:
- https://github.com/sooperset/mcp-atlassian/security/advisories/GHSA-7r34-79r5-rcc9
author: RAXE Labs
date: 2026-03-11
tags:
- attack.execution
- cve.2026.27826
logsource:
category: application
product: mcp
detection:
selection:
tool_name|contains: 'atlassian'
keywords:
response|contains:
- 'ignore previous instructions'
- 'system prompt'
- 'you are now'
- 'disregard all'
condition: selection and keywords
falsepositives:
- Legitimate Jira/Confluence content discussing AI or prompt engineering
- High false positive rate expected -- manual review required
level: medium
Rule 4: MCP Atlassian HTTP Transport Exposure Check (Posture)
Classification: Posture/exposure rule
title: MCP Atlassian Running with HTTP Transport
id: raxe-2026-034-r4
status: experimental
description: >
Posture rule to identify mcp-atlassian instances running with HTTP
transport enabled. Only HTTP transport (streamable-http or SSE)
exposes the SSRF attack surface; stdio transport is not affected
(GHSA-7r34-79r5-rcc9). Requires process argument or configuration
audit (RAXE assessment).
references:
- https://github.com/sooperset/mcp-atlassian/security/advisories/GHSA-7r34-79r5-rcc9
author: RAXE Labs
date: 2026-03-11
tags:
- attack.reconnaissance
logsource:
category: process_creation
product: any
detection:
selection:
CommandLine|contains:
- 'mcp-atlassian'
- 'mcp_atlassian'
filter_http:
CommandLine|contains:
- '--transport streamable-http'
- '--transport sse'
condition: selection and filter_http
falsepositives:
- Intentional HTTP transport usage on patched versions (>= 0.17.0)
level: low
10. Detection & Mitigation
Detection Guidance
Network-level detection: Rule 1 detects the inbound SSRF trigger by looking for the combination of custom Atlassian service URL headers (X-Atlassian-Jira-Url or X-Atlassian-Confluence-Url) without an Authorization header in web server access logs (RAXE assessment). This requires a log source that captures custom HTTP request headers, which is not standard in all web server configurations (RAXE assessment). Rule 2 detects the outbound SSRF request by monitoring for connections from the MCP server process to RFC 1918 private ranges, localhost, or cloud metadata endpoints; this requires egress proxy or network monitoring that can attribute traffic to the MCP server process (RAXE assessment).
Application-level detection: Rule 3 is a hunting rule that searches for common prompt injection patterns in MCP tool responses (RAXE assessment). It requires application-level logging of MCP tool response content, which is not a standard capability in most MCP server deployments (RAXE assessment). This rule has a high expected false positive rate and is intended for analyst-guided hunting rather than automated alerting (RAXE assessment).
Posture assessment: Rule 4 identifies mcp-atlassian instances running with HTTP transport enabled via process command-line argument monitoring (RAXE assessment). This rule assists in exposure assessment rather than active exploitation detection (RAXE assessment).
Mitigation Recommendations
-
Upgrade to
0.17.0or later; this is the primary remediation (GHSA-7r34-79r5-rcc9, PyPI). Version0.17.0was released on 2026-02-24 (PyPI). -
Audit transport configuration; verify whether MCP servers in the environment use HTTP transport; stdio-only deployments are not affected regardless of version (
GHSA-7r34-79r5-rcc9). -
Restrict listening interface; the advisory notes that the default deployment uses
HOST=0.0.0.0, which exposes the server on all interfaces (GHSA-7r34-79r5-rcc9). Bind the MCP server to127.0.0.1or a specific internal interface to limit the attack surface (RAXE assessment). -
Enable
IMDSv2; on AWS-hosted instances, enforceIMDSv2(Instance Metadata Service Version 2) to require token-based requests for metadata access, mitigating the cloud credential theft vector (RAXE assessment). -
Network segmentation; ensure MCP server HTTP endpoints are not reachable from untrusted network segments (RAXE assessment).
-
MCP middleware audit; review all deployed MCP servers for header-based URL injection patterns in middleware and authentication handling code (RAXE assessment). The vulnerability pattern (custom HTTP headers used to configure backend service URLs without validation) may exist in other MCP server implementations (RAXE assessment).
11. Indicators of Compromise
Behavioural Indicators
| Type | Indicator | Context | Source |
|---|---|---|---|
| HTTP Header | X-Atlassian-Jira-Url containing non-Atlassian domain |
Inbound request to MCP server without Authorization header |
GHSA-7r34-79r5-rcc9 |
| HTTP Header | X-Atlassian-Confluence-Url containing non-Atlassian domain |
Inbound request to MCP server without Authorization header |
GHSA-7r34-79r5-rcc9 |
| Outbound connection | MCP server process connecting to RFC 1918 ranges, 127.0.0.0/8, or 169.254.169.254 |
SSRF outbound request triggered by middleware | GHSA-7r34-79r5-rcc9 |
| Outbound connection | MCP server process connecting to external IP/domain not matching configured Atlassian instance | SSRF redirection to attacker-controlled server | RAXE assessment |
| Application log | MCP tool response containing prompt injection patterns (e.g., "ignore previous instructions") | Poisoned API response from attacker-controlled URL injected into LLM context | GHSA-7r34-79r5-rcc9 |
| Process argument | mcp-atlassian or mcp_atlassian with --transport streamable-http or --transport sse on versions < 0.17.0 |
Vulnerable deployment exposed to attack | GHSA-7r34-79r5-rcc9 |
Network Indicators
| Type | Pattern | Notes |
|---|---|---|
| Outbound HTTP | GET /rest/api/2/myself to non-Atlassian IP |
The SSRF triggers get_current_user_account_id() which issues this Jira API call (GHSA-7r34-79r5-rcc9) |
| Outbound HTTP | GET /latest/meta-data/iam/security-credentials/ to 169.254.169.254 |
AWS IMDSv1 credential theft attempt (GHSA-7r34-79r5-rcc9) |
12. Strategic Context
MCP Ecosystem Security Implications
The Model Context Protocol (MCP) ecosystem is expanding rapidly as organisations adopt AI agents that interact with enterprise tools (RAXE assessment). CVE-2026-27826 illustrates a vulnerability class that is specific to MCP server architecture: the middleware layer that handles transport, authentication, and dependency injection sits between the HTTP interface and the tool implementation code, creating a security boundary that standard tool-level code review does not cover (GHSA-7r34-79r5-rcc9, RAXE assessment).
Middleware as an Attack Surface
The vulnerability pattern (custom HTTP headers used to configure backend service URLs without validation) is not unique to mcp-atlassian (RAXE assessment). Any MCP server that supports HTTP transport and accepts header-based configuration of backend service endpoints without allowlist validation may be susceptible to similar SSRF attacks (RAXE assessment). The chained SSRF-to-prompt-injection path is particularly significant because it demonstrates how a network-layer vulnerability in AI agent infrastructure can escalate to manipulation of the LLM's behaviour through the data plane (RAXE assessment).
MITRE ATLAS Mapping
This vulnerability maps to MITRE ATLAS technique AML.T0010.001 (AI Supply Chain Compromise: AI Software), as the vulnerability exists in a software component within the AI agent supply chain, specifically the MCP server that provides tool access to the LLM (ATLAS).
Disclosure Timeline
| Date | Event | Source |
|---|---|---|
| 2026-02-24 | GHSA advisory published; patch (0.17.0) released to PyPI |
GHSA-7r34-79r5-rcc9, PyPI |
| 2026-03-10 | CVE-2026-27826 published to NVD (Awaiting Analysis) |
NVD |
| 2026-03-11 | RAXE Labs signal detection and analysis | RAXE Labs |
13. References
CVE-2026-27826, NVD — National Vulnerability Database entry (vulnStatus: Awaiting Analysis)- GHSA-7r34-79r5-rcc9 — GitHub Security Advisory (primary source)
- Fix Commit: sooperset/mcp-atlassian@5cd697d — Patch commit
- mcp-atlassian 0.17.0, PyPI — Fixed version on Python Package Index
- EPSS,
CVE-2026-27826— FIRST.org Exploit Prediction Scoring System CWE-918: Server-Side Request Forgery (SSRF) — MITRE CWEAML.T0010.001: AI Supply Chain Compromise: AI Software — MITRE ATLAS