Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 07 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-23 | |
| Metrics |
cvssV3_1
|
Wed, 07 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | @sylphxltd/filesystem-mcp v0.5.8 is an MCP server that provides file content reading functionality. Version 0.5.8 of filesystem-mcp contains a critical path traversal vulnerability in its "read_content" tool. This vulnerability arises from improper symlink handling in the path validation mechanism: the resolvePath function checks path validity before resolving symlinks, while fs.readFile resolves symlinks automatically during file access. This allows attackers to bypass directory restrictions by leveraging symlinks within the allowed directory that point to external files, enabling unauthorized access to files outside the intended operational scope. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-07T17:18:19.832Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-67366
Updated: 2026-01-07T17:18:13.992Z
Status : Awaiting Analysis
Published: 2026-01-07T17:16:01.893
Modified: 2026-01-08T18:08:54.147
Link: CVE-2025-67366
No data.
OpenCVE Enrichment
No data.