Description
A vulnerability was detected in elie mcp-project 0.1.0. The affected element is the function search_papers of the file research_server.py. The manipulation of the argument topic results in path traversal. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-28
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the search_papers function of research_server.py in elie mcp-project version 0.1.0. By manipulating the topic argument, an attacker can walk the file system, accessing files outside the intended directory. This type of path traversal can expose sensitive configuration files or other data, affecting confidentiality and integrity of local files. The weakness is identified as CWE‑22.

Affected Systems

The affected product is elie’s MCP‑Project 0.1.0, a research server component that handles paper search requests.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate risk, primarily due to local execution requirements. No EPSS score is available, and the vulnerability is not listed in CISA KEV, suggesting limited known exploitation. Because exploitation requires local access, attackers would need physical or remote compromised credentials on the host running the server. The path traversal is straightforward to trigger once the topic parameter is controlled by an attacker.

Generated by OpenCVE AI on April 29, 2026 at 01:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Validate and sanitize the topic argument to disallow directory traversal characters such as "../" or resolve the path using a safe base directory.
  • Restrict the service to run under a user with minimal file system permissions, limiting the scope of accessible files.
  • Enforce file access policies or use containerization to isolate the application from the host file system.
  • Monitor application logs for anomalous search requests that may attempt to traverse directories.

Generated by OpenCVE AI on April 29, 2026 at 01:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 29 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Elie
Elie mcp-project
Vendors & Products Elie
Elie mcp-project

Tue, 28 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in elie mcp-project 0.1.0. The affected element is the function search_papers of the file research_server.py. The manipulation of the argument topic results in path traversal. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title elie mcp-project research_server.py search_papers path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 4.6, 'vector': 'AV:L/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.9, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Elie Mcp-project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-29T13:02:52.632Z

Reserved: 2026-04-28T13:12:35.060Z

Link: CVE-2026-7318

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-28T22:16:51.890

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-7318

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:10:22Z

Weaknesses