Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). Versions of Filesystem prior to 0.6.4 or 2025.7.01 could allow access to unintended files via symlinks within allowed directories. Users are advised to upgrade to 0.6.4 or 2025.7.01 resolve.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-19730 @modelcontextprotocol/server-filesystem allows for path validation bypass via prefix matching and symlink handling
Github GHSA Github GHSA GHSA-q66q-fx2p-7w4m @modelcontextprotocol/server-filesystem allows for path validation bypass via prefix matching and symlink handling
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00136}

epss

{'score': 0.00139}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00082}

epss

{'score': 0.00136}


Wed, 02 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 02 Jul 2025 14:45:00 +0000

Type Values Removed Values Added
Description Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). Versions of Filesystem prior to 0.6.4 or 2025.7.01 could allow access to unintended files via symlinks within allowed directories. Users are advised to upgrade to 0.6.4 or 2025.7.01 resolve.
Title Model Context Protocol Servers Vulnerable to Path Validation Bypass via Prefix Matching and Symlink Handling
Weaknesses CWE-59
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-07-02T14:50:18.562Z

Reserved: 2025-06-25T13:41:23.087Z

Link: CVE-2025-53109

cve-icon Vulnrichment

Updated: 2025-07-02T14:50:12.316Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-02T15:15:27.670

Modified: 2025-07-03T15:13:53.147

Link: CVE-2025-53109

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.