Impact
The vulnerability resides in the MCP Interface component of ryanjoachim's mcp-rtfm v0.1.0. In the get_doc_content, read_doc, and update_doc functions, an attacker can supply a crafted docFile argument that causes a path traversal, allowing traversal outside the intended document directory. This remote exploitation can lead to unauthorized access to system files or data, constituting a significant confidentiality breach.
Affected Systems
The affected product is the open‑source MCP Interface known as mcp-rtfm, maintained by ryanjoachim, specifically versions starting at 0.1.0. The path traversal flaw impacts the functions that handle document content operations, and the vulnerability is present in all releases that have not applied the documented patch.
Risk and Exploitability
With a CVSS score of 5.3, the flaw represents moderate severity, and while the EPSS score is not available, publicly documented exploits suggest it can be abused. Because the attack vector is remote and the weakness is a classic path traversal (CWE‑22), authenticated or unauthenticated users with network access to the MCP Interface can potentially read arbitrary files. The vulnerability is not listed in the CISA KEV catalog, but the availability of a public exploit increases the likelihood of real‑world attacks.
OpenCVE Enrichment