No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-19730 | @modelcontextprotocol/server-filesystem allows for path validation bypass via prefix matching and symlink handling |
Github GHSA |
GHSA-q66q-fx2p-7w4m | @modelcontextprotocol/server-filesystem allows for path validation bypass via prefix matching and symlink handling |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 02 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 02 Jul 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). Versions of Filesystem prior to 0.6.4 or 2025.7.01 could allow access to unintended files via symlinks within allowed directories. Users are advised to upgrade to 0.6.4 or 2025.7.01 resolve. | |
| Title | Model Context Protocol Servers Vulnerable to Path Validation Bypass via Prefix Matching and Symlink Handling | |
| Weaknesses | CWE-59 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-02T14:50:18.562Z
Reserved: 2025-06-25T13:41:23.087Z
Link: CVE-2025-53109
Updated: 2025-07-02T14:50:12.316Z
Status : Deferred
Published: 2025-07-02T15:15:27.670
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-53109
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA