Description
A security vulnerability has been detected in geekgod382 filesystem-mcp-server 1.0.0. This issue affects the function is_path_allowed of the file server.py of the component read_file_tool/write_file_tool. Such manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.1.0 is capable of addressing this issue. The name of the patch is 45364545fc60dc80aadcd4379f08042d3d3d292e. Upgrading the affected component is advised.
Published: 2026-04-29
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the is_path_allowed function of read_file_tool/write_file_tool in geekgod382 filesystem-mcp-server 1.0.0. It allows an attacker who can reach the server to craft requests that bypass path validation, enabling traversal outside the intended directory. This flaw can lead to reading or writing arbitrary files on the host, jeopardizing confidentiality, integrity, and possibly availability if critical system files are altered. The weakness is a classic directory traversal, classified under CWE-22.

Affected Systems

The affected product is geekgod382 filesystem-mcp-server version 1.0.0. Users running this version are vulnerable. The issue is fixed in version 1.1.0, as identified by the patch commit 45364545fc60dc80aadcd4379f08042d3d3d292e.

Risk and Exploitability

The CVSS score of 6.9 indicates moderate severity; the EPSS score is not available, so the probability of exploitation cannot be quantified. The vulnerability is not listed in the CISA KEV catalog, but it has been publicly disclosed and may be used by remote attackers. Since the flaw involves path traversal, the attack vector is remote, exploiting network exposed interfaces of the server.

Generated by OpenCVE AI on April 29, 2026 at 21:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade geekgod382 filesystem-mcp-server to version 1.1.0 or newer. The upgrade incorporates the necessary path validation fix.
  • If upgrading immediately is not possible, apply the specific patch identified by commit hash 45364545fc60dc80aadcd4379f08042d3d3d292e to version 1.0.0.
  • For environments where a patch or upgrade cannot be applied promptly, restrict network access to the service or place the server behind a firewall to limit exposure to potential attackers.

Generated by OpenCVE AI on April 29, 2026 at 21:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Geekgod382
Geekgod382 filesystem-mcp-server
Vendors & Products Geekgod382
Geekgod382 filesystem-mcp-server

Wed, 29 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in geekgod382 filesystem-mcp-server 1.0.0. This issue affects the function is_path_allowed of the file server.py of the component read_file_tool/write_file_tool. Such manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.1.0 is capable of addressing this issue. The name of the patch is 45364545fc60dc80aadcd4379f08042d3d3d292e. Upgrading the affected component is advised.
Title geekgod382 filesystem-mcp-server read_file_tool/write_file_tool server.py is_path_allowed path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Geekgod382 Filesystem-mcp-server
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-29T19:57:13.981Z

Reserved: 2026-04-29T11:33:40.612Z

Link: CVE-2026-7400

cve-icon Vulnrichment

Updated: 2026-04-29T19:56:49.523Z

cve-icon NVD

Status : Deferred

Published: 2026-04-29T20:16:31.393

Modified: 2026-04-29T21:16:21.590

Link: CVE-2026-7400

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:20:53Z

Weaknesses