Impact
A path traversal flaw exists in the search_papers function of research_server.py. By manipulating the topic argument, an attacker can read files outside the intended directory. Remote exploitation is possible, meaning an attacker can reach the vulnerable function over the network and gain unauthorized access to sensitive files, potentially leading to further compromise if executable files are read.
Affected Systems
The vulnerability affects ezequiroga’s mcp-bases project. No specific version numbers are listed because the project follows a rolling release model, so all current releases are potentially impacted until a patch is provided.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate to high risk. EPSS data is unavailable, and the vulnerability has not yet been listed in CISA’s KEV catalog. Attackers likely need to send crafted requests to the research_server.py endpoint, and success depends on the exposed API surface and lack of input validation. Because the issue is publicly documented and no response from the maintainer has been received, the risk of exploitation remains significant.
OpenCVE Enrichment