Description
A vulnerability has been found in dexhunter kaggle-mcp up to 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d. This vulnerability affects the function prepare_kaggle_dataset of the file src/kaggle_mcp/server.py. The manipulation of the argument competition_id leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-27
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Path traversal
Action: Apply patch
AI Analysis

Impact

A path traversal vulnerability exists in the prepare_kaggle_dataset function of dexhunter/kaggle-mcp. The function accepts a competition_id parameter without adequate validation, allowing an attacker to include directory traversal components that resolve to locations outside the intended dataset directory. If exploited, the attacker can read arbitrary files on the filesystem where the service runs, potentially exposing sensitive data. The flaw corresponds to CWE‑22.

Affected Systems

The vulnerability affects all releases of dexhunter/kaggle-mcp up to the code revision 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d. Because the project uses a rolling release strategy, no specific version numbers are available; any current revision that has not been updated by the maintainer remains vulnerable.

Risk and Exploitability

The vulnerability is exploitable remotely via the public API endpoint that processes competition_id inputs. The documented CVSS score is 6.9, indicating medium severity with potential confidentiality and integrity impact. No EPSS score is available and the issue is not listed in CISA KEV, but the fact that it is publicly disclosed and the project has not yet released a fix suggests that the opportunity for exploitation may remain until the maintainer publishes a patch. Security teams should treat the risk as moderate to high for exposed services.

Generated by OpenCVE AI on April 28, 2026 at 19:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy the latest revision of dexhunter/kaggle-mcp once an official patch is released.
  • Sanitise the competition_id input by removing or rejecting any path‑traversal sequences such as '..' or leading slashes.
  • Restrict access to the prepare_kaggle_dataset endpoint to authenticated users or narrow network exposure, and consider using a WAF rule to block obvious traversal payloads.

Generated by OpenCVE AI on April 28, 2026 at 19:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-q882-jc55-6343 kaggle-mcp has a Path Traversal issue
History

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Dexhunter
Dexhunter kaggle-mcp
Vendors & Products Dexhunter
Dexhunter kaggle-mcp

Mon, 27 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in dexhunter kaggle-mcp up to 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d. This vulnerability affects the function prepare_kaggle_dataset of the file src/kaggle_mcp/server.py. The manipulation of the argument competition_id leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report but has not responded yet.
Title dexhunter kaggle-mcp server.py prepare_kaggle_dataset path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Dexhunter Kaggle-mcp
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-27T19:29:54.456Z

Reserved: 2026-04-26T20:02:16.564Z

Link: CVE-2026-7149

cve-icon Vulnrichment

Updated: 2026-04-27T19:29:45.823Z

cve-icon NVD

Status : Deferred

Published: 2026-04-27T19:16:54.277

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7149

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T19:45:07Z

Weaknesses