Impact
A flaw exists in fatbobman mail-mcp-bridge up to version 1.3.3 that allows an attacker to manipulate the message_ids argument in src/mail_mcp_server.py. This manipulation enables a path traversal attack, potentially granting read or write access to arbitrary files on the host system. The vulnerability is present in a function with unclear internal name, but its exploitation could result in a breach of confidentiality and the ability to modify system files, which may impact availability as well.
Affected Systems
The affected product is fatbobman mail-mcp-bridge, with all releases up to and including 1.3.3 susceptible. Version 1.3.4 includes a fix based on commit 638b162b26532e32fa8d8047f638537dbdfe197a. No other products or vendors are noted as affected.
Risk and Exploitability
The CVSS score of 6.9 indicates moderate severity. An EPSS score is not available, and the vulnerability is not listed in CISA KEV, yet the exploit has already been published and is considered remotely executable. The attack vector is inferred to be remote, as the description specifies that the exploit can be triggered without local access.
OpenCVE Enrichment