Impact
The vulnerability is a path traversal in the export_state function of src/consciousness-explorer/mcp/server.js. An attacker can supply a crafted file path and read or modify arbitrary files on the server, exposing sensitive data and potentially enabling further attacks. This flaw is a local file access issue (CWE-22) that can compromise confidentiality and integrity of the system.
Affected Systems
Affected software is ruvnet sublinear-time-solver version 1.5.0, specifically the MCP Interface component. Only this version is listed; no newer versions with a fix are known.
Risk and Exploitability
The CVSS score is 6.9, indicating medium‑high risk. No EPSS data and the vulnerability is not listed in CISA KEV. A proof‑of‑concept exploit is publicly available, and the attack can be carried out remotely via the exported endpoint. The lack of vendor response raises the likelihood that the vulnerability could be actively used in the wild.
OpenCVE Enrichment