The analysis of the security advisory and the associated patch commit 18f4323ca92763196aa2922f691dfbeb6bd84e48 reveals an information disclosure vulnerability in the mcp-memory-service. The root cause was two FastAPI endpoints, health_check and detailed_health_check, in src/mcp_memory_service/web/api/health.py that exposed sensitive system and application data.
The detailed_health_check function was the most critical, as it returned OS version, Python version, hardware details, and the absolute file path to the application's database. This was accessible to any user with read permissions, which included anonymous users if MCP_ALLOW_ANONYMOUS_ACCESS was enabled. The patch remediated this by elevating the required permission to require_write_access (admin-level) and stripping the sensitive fields from the response, leaving only resource utilization percentages.
The health_check function was also vulnerable, leaking the application version and uptime without any authentication. The patch fixed this by removing these fields, making the endpoint return only a static "healthy" status.
Additionally, a defense-in-depth mitigation was applied in src/mcp_memory_service/config.py by changing the default HTTP host binding from 0.0.0.0 to 127.0.0.1. This prevents the service from being exposed to the network by default, reducing the attack surface for this and other potential vulnerabilities.