Impact
The vulnerability resides in the save_file tool of ef10007 MLOps_MCP version 1.0.0. An attacker can supply a crafted filename or destination argument that includes path traversal sequences, causing the fastmcp_server.py routine to write or read files outside the intended directory. This allows remote users to access or modify arbitrary files on the host, potentially exposing sensitive data or enabling further compromise. The weakness is a classic path traversal flaw (CWE-22) and is rated as moderate severity with a CVSS score of 6.9.
Affected Systems
The affected product is ef10007 MLOps_MCP version 1.0.0. The exploit targets the fastmcp_server.py component, specifically the save_file function. No other versions or components were reported as affected, and the vendor has not released a fixed version yet.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate risk, and the EPSS score of < 1% indicates a low probability of widespread exploitation. Since the vulnerability is publicly disclosed and can be triggered remotely, the potential for attackers to read or overwrite sensitive files exists. The absence from the KEV catalog means it is not yet listed as widely exploited, but the remote nature and lack of patch emphasize the importance of timely mitigation.
OpenCVE Enrichment