Impact
The vulnerability resides in the create_notebook/read_notebook/edit_cell/add_cell functions of python‑notebook‑mcp’s server.py file, allowing an attacker to manipulate file paths and trigger a path traversal flaw. This flaw can be triggered remotely and may enable reading or writing arbitrary files on the host, potentially facilitating the execution of malicious code or theft of sensitive data. The weakness is classed as CWE‑22. The product uses a rolling release model, so all commits up to a05a2328 are affected until a fix is released.
Affected Systems
All releases of the UsamaK98:python‑notebook‑mcp project up to commit a05a2328 are vulnerable. The project lacks a specific versioned release, so any installation using the current rolling release is at risk.
Risk and Exploitability
The CVSS score of 6.9 places the flaw in the high‑severity range. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog, but published exploit code exists, indicating a realistic attack window. Based on the description, it is inferred that the exploit proceeds by sending a crafted add_cell request that manipulates the path component; once the server resolves the path, it can access files outside the intended directory, making the risk substantial for exposed deployments.
OpenCVE Enrichment