Impact
The vulnerability originates from an unchecked file_path argument in the scaffold‑mcp write‑to‑file tool, allowing a path traversal attack. An attacker can direct the server to write files outside the intended directory, potentially overwriting system or application files. Based on the description, it is inferred that this could lead to corruption of configuration files or placement of malicious scripts that might be executed later, compromising the integrity of the affected system. This flaw is classified as CWE‑22 and carries a CVSS score of 6.9, indicating moderate severity.
Affected Systems
All installations of AgiFlow scaffold‑mcp versions up to and including 1.0.27 are vulnerable. The issue was fixed in version 1.1.0, as identified by commit c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6. No other versions are known to be affected.
Risk and Exploitability
The attack vector is remote, relying on sending a crafted file_path. The exploit is publicly available and does not require any special privileges, making it accessible to unauthenticated users if the endpoint is exposed. With a CVSS score of 6.9, the risk is moderate, and the lack of an EPSS score introduces uncertainty about current exploitation prevalence. The vulnerability is not listed in CISA KEV. The public nature of the exploit urges timely remediation.
OpenCVE Enrichment