Impact
The vulnerability is located in the execute_matlab_code function of the WilliamCloudQi matlab-mcp-server component. By manipulating the scriptPath argument supplied to this function, an attacker can perform a directory traversal, potentially allowing access to files outside the intended directory. This flaw may enable an attacker to read or modify sensitive files on the server, which could lead to compromise of the application. The issue is identified as a Path Traversal weakness (CWE‑22).
Affected Systems
WilliamCloudQi matlab-mcp-server, any deployment that includes code up to commit ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate to high severity. The flaw is exploitable remotely, and published exploits are available. No EPSS score is present and the issue is not listed in CISA KEV. Based on the description, it is inferred that the attack vector involves supplying a crafted scriptPath parameter to the execute_matlab_code endpoint, enabling path traversal on the server.
OpenCVE Enrichment