Impact
The vulnerability is a path traversal flaw in the _get_context_file_path function of the add_action Tool in elinsky execution-system-mcp. By manipulating the context argument, an attacker can cause the server to resolve file paths that escape the intended directory, enabling access to files outside the designated context. The flaw allows reading of sensitive files or potentially triggering unintended behavior, which directly impacts confidentiality and could serve as a foothold for further exploitation. Based on the description, it is inferred that the attack results in unauthorized file access.
Affected Systems
The flaw exists in elinsky execution-system-mcp version 0.1.0. Users running this version on any platform that exposes the server component are at risk until a patch is applied or the vulnerability is mitigated.
Risk and Exploitability
The CVSS score of 6.9 indicates medium severity. Although an EPSS score is not available, the published exploit and the ability to initiate the attack remotely raise concern. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is remote, likely through an HTTP interface that accepts the context argument, and no special authentication is required. Because the flaw permits arbitrary file access, an adversary could read privileged files, potentially leading to data leakage or further exploitation.
OpenCVE Enrichment