fastmcp is vulnerable to Denial of Service (DoS)
65
Medium Risk
Affected versions of this package allow a file size limit bypass in the FileUpload store_files tool because the max_file_size check trusts the client-controlled size field instead of validating the real decoded payload size. An attacker can exploit this by submitting a large base64-encoded file while falsely reporting a tiny size value, allowing oversized uploads that should have been rejected. It undermines the intended upload restriction and may enable resource exhaustion, storage abuse, or other downstream impacts depending on how uploaded files are processed.
You are affected if you are using a version that falls within the vulnerable range.
fastmcp is vulnerable to Denial of Service (DoS) in versions 3.2.0 - 3.2.3.
Upgrade the fastmcp library to the patch version.
Secure your code, cloud, and runtime environments in one central system. Find and fix vulnerabilities automatically.
No credit card required | Scan results in 32secs.
SOC 2Compliant
ISO 27001Compliant