Description
A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.
Published: 2026-04-28
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a path traversal flaw in the _get_context_file_path function of the add_action Tool in elinsky execution-system-mcp. By manipulating the context argument, an attacker can cause the server to resolve file paths that escape the intended directory, enabling access to files outside the designated context. The flaw allows reading of sensitive files or potentially triggering unintended behavior, which directly impacts confidentiality and could serve as a foothold for further exploitation. Based on the description, it is inferred that the attack results in unauthorized file access.

Affected Systems

The flaw exists in elinsky execution-system-mcp version 0.1.0. Users running this version on any platform that exposes the server component are at risk until a patch is applied or the vulnerability is mitigated.

Risk and Exploitability

The CVSS score of 6.9 indicates medium severity. Although an EPSS score is not available, the published exploit and the ability to initiate the attack remotely raise concern. The vulnerability is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is remote, likely through an HTTP interface that accepts the context argument, and no special authentication is required. Because the flaw permits arbitrary file access, an adversary could read privileged files, potentially leading to data leakage or further exploitation.

Generated by OpenCVE AI on April 29, 2026 at 03:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an updated version of execution-system-mcp that removes the unvalidated path resolution in _get_context_file_path.
  • Restrict external access to the server by implementing firewall rules or network segmentation so that only trusted hosts can reach the add_action endpoint.
  • Implement input validation to ensure that the context parameter does not contain directory traversal characters or paths that escape the intended root directory; enforce a whitelist of legitimate file locations.

Generated by OpenCVE AI on April 29, 2026 at 03:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Elinsky
Elinsky execution-system-mcp
Vendors & Products Elinsky
Elinsky execution-system-mcp

Tue, 28 Apr 2026 22:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.
Title elinsky execution-system-mcp add_action Tool server.py _get_context_file_path path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Elinsky Execution-system-mcp
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-30T12:59:07.534Z

Reserved: 2026-04-28T13:42:01.353Z

Link: CVE-2026-7319

cve-icon Vulnrichment

Updated: 2026-04-30T12:59:03.194Z

cve-icon NVD

Status : Deferred

Published: 2026-04-28T22:16:52.050

Modified: 2026-04-29T21:16:21.590

Link: CVE-2026-7319

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T10:10:21Z

Weaknesses