Impact
The vulnerability resides in the search_papers function of research_server.py in elie mcp-project version 0.1.0. By manipulating the topic argument, an attacker can walk the file system, accessing files outside the intended directory. This type of path traversal can expose sensitive configuration files or other data, affecting confidentiality and integrity of local files. The weakness is identified as CWE‑22.
Affected Systems
The affected product is elie’s MCP‑Project 0.1.0, a research server component that handles paper search requests.
Risk and Exploitability
The CVSS score of 5.1 indicates moderate risk, primarily due to local execution requirements. No EPSS score is available, and the vulnerability is not listed in CISA KEV, suggesting limited known exploitation. Because exploitation requires local access, attackers would need physical or remote compromised credentials on the host running the server. The path traversal is straightforward to trigger once the topic parameter is controlled by an attacker.
OpenCVE Enrichment