Impact
The vulnerability is a path traversal flaw located in the dirname argument handling within the ResourceManager.ts component of the MCP Log Resource. By supplying a crafted value, an attacker can cause the system to refer to arbitrary file system paths, potentially leading to remote code execution or arbitrary file disclosure. The issue resides in a publicly accessible API endpoint, allowing the attack to be launched remotely without needing elevated local privileges.
Affected Systems
ZachHandley:ZMCPTools software versions up to and including 0.2.2 are susceptible. No other product or version information is documented in the CNA data.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity, and the EPSS score is not available, so the current exploitation likelihood is uncertain. The vulnerability is not yet listed in CISA’s KEV catalog. Because exploitation is possible remotely, an attacker could target any instance of ZMCPTools exposed to an untrusted network. No public exploit code was disclosed at submission, but the vulnerability is publicly documented and may be used by threat actors.
OpenCVE Enrichment