Impact
The vulnerability is a path traversal flaw in the export_to_html function of Dayoooun hwpx-mcp version 0.2.0. By manipulating the output_path argument, an attacker can traverse to arbitrary files on the host filesystem, enabling the reading of sensitive data and, if permissions allow, the writing or execution of files, which could lead to remote code execution.
Affected Systems
Affected product: Dayoooun hwpx-mcp 0.2.0 – specifically the MCP Interface’s mcp-server component in the file mcp-server/src/index.ts. No other products or versions were identified as vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. EPSS is not available and the vulnerability is not listed in the CISA KEV catalog, but the description states that remote exploitation is possible and the exploit is publicly available. Since the vendor has not released a patch, the most likely attack vector is a remote client sending crafted output_path values to the export endpoint over the network. The risk remains until a fix is deployed or mitigations are applied.
OpenCVE Enrichment