Impact
The vulnerability originates in the arango_backup function of the MCP Server for Arangodb component, where an unchecked outputDir parameter can be manipulated to perform path traversal. An attacker can control the directory location used during backup creation, potentially creating or overwriting files outside the intended backup directory. This path traversal flaw could allow the construction of arbitrary file paths, providing the possibility to write malicious files or exfiltrate sensitive data. The weakness corresponds to CWE‑22 and is announced as remotely exploitable.
Affected Systems
The flaw affects all released versions of the ravenwits mcp-server-arangodb up to and including 0.4.7. Users running any of these versions are susceptible to the attack. No specific later releases have been listed as vulnerable, implying patching in a newer release.
Risk and Exploitability
The CVSS score of the flaw is 5.3, placing it in the moderate severity range. No EPSS score is available, and the issue is not yet listed in the CISA KEV catalog. Because the attacker can trigger the backup operation remotely, the risk of exploitation is realistic in exposed deployments. Successful exploitation could lead to unauthorized file creation or potential data exfiltration, depending on filesystem permissions of the service process.
OpenCVE Enrichment