Description
A security vulnerability has been detected in ZachHandley ZMCPTools up to 0.2.2. Affected by this issue is some unknown functionality of the file src/managers/ResourceManager.ts of the component MCP Log Resource Handler. The manipulation of the argument dirname leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-04-29
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a path traversal flaw located in the dirname argument handling within the ResourceManager.ts component of the MCP Log Resource. By supplying a crafted value, an attacker can cause the system to refer to arbitrary file system paths, potentially leading to remote code execution or arbitrary file disclosure. The issue resides in a publicly accessible API endpoint, allowing the attack to be launched remotely without needing elevated local privileges.

Affected Systems

ZachHandley:ZMCPTools software versions up to and including 0.2.2 are susceptible. No other product or version information is documented in the CNA data.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity, and the EPSS score is not available, so the current exploitation likelihood is uncertain. The vulnerability is not yet listed in CISA’s KEV catalog. Because exploitation is possible remotely, an attacker could target any instance of ZMCPTools exposed to an untrusted network. No public exploit code was disclosed at submission, but the vulnerability is publicly documented and may be used by threat actors.

Generated by OpenCVE AI on April 30, 2026 at 03:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update ZMCPTools to a version that includes the Path Traversal fix when it becomes available.
  • If an update is not feasible, limit access to the MCP Log Resource interface to trusted network segments or apply firewall rules to block remote connections.
  • Ensure that the application validates or normalizes the dirname parameter, rejecting traversal patterns such as '..' before processing.

Generated by OpenCVE AI on April 30, 2026 at 03:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Zachhandley
Zachhandley zmcptools
Vendors & Products Zachhandley
Zachhandley zmcptools

Thu, 30 Apr 2026 00:15:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in ZachHandley ZMCPTools up to 0.2.2. Affected by this issue is some unknown functionality of the file src/managers/ResourceManager.ts of the component MCP Log Resource Handler. The manipulation of the argument dirname leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Title ZachHandley ZMCPTools MCP Log Resource ResourceManager.ts path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Zachhandley Zmcptools
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-30T15:21:48.720Z

Reserved: 2026-04-29T16:53:15.710Z

Link: CVE-2026-7445

cve-icon Vulnrichment

Updated: 2026-04-30T15:18:28.363Z

cve-icon NVD

Status : Deferred

Published: 2026-04-30T00:16:23.340

Modified: 2026-04-30T14:52:54.847

Link: CVE-2026-7445

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:20:22Z

Weaknesses