Impact
The vulnerability resides in geldata gel-mcp 0.1.0 and is triggered when a malicious value is supplied to the rule_name argument in the fetch_rule endpoint. The insufficient sanitization of this argument permits path traversal, enabling an attacker to request resources outside the intended directory, potentially exposing sensitive configuration files or other confidential data. Because the flaw is reachable over the network, an attacker can exploit it from a remote host, compromising the confidentiality of system files.
Affected Systems
Geldata’s gel-mcp service, specifically version 0.1.0. The issue was identified in the src/gel_mcp/server.py file which implements the list_rules/fetch_rule functionality. No other versions or products were mentioned in the CVE record.
Risk and Exploitability
The CVSS score of 6.9 reflects a moderate severity, and the exploit is known to be publicly available. The EPSS score is not reported, indicating either insufficient data or low exploitation probability; however, the CVE notes that the vulnerability can be exploited remotely from outside the host. The vulnerability is not listed in CISA's KEV catalog, so it has not yet been recognized as a freely available exploit in that repository. In practice, an attacker only needs network access to the service’s endpoint to leverage the path traversal failure.
OpenCVE Enrichment