Description
A vulnerability has been found in 54yyyu code-mcp up to 4cfc4643541a110c906d93635b391bf7e357f4a8. The affected element is the function is_safe_path of the file src/code_mcp/server.py of the component MCP File Handler. Such manipulation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-05
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the is_safe_path function within the MCP File Handler component of 54yyyu code-mcp. It permits attackers to manipulate input paths so that the server resolves to files outside the intended directory, enabling unauthorized file access or potential remote code execution if executable files are accessed. The issue is exploitable remotely and has been publicly disclosed, which could compromise confidentiality, integrity, and availability of the affected system.

Affected Systems

Any installation of 54yyyu code-mcp that incorporates version material up to and including commit 4cfc4643541a110c906d93635b391bf7e357f4a8 is vulnerable. The project uses a rolling release model and does not publish exact version release dates, so previous releases prior to this commit are likely affected.

Risk and Exploitability

The CVSS score is 6.9, indicating moderate severity. The EPSS score is not available and the vulnerability is not listed in CISA KEV, so there is currently no evidence of active exploitation. However, because the flaw can be triggered remotely via the server module and the repository is publicly available, the risk of exploitation remains moderate. Without an official fix, attackers could target exposed instances to read arbitrary files or run code if sufficient privileges are granted.

Generated by OpenCVE AI on May 5, 2026 at 06:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the code base to a commit newer than 4cfc4643541a110c906d93635b391bf7e357f4a8 once an official fix is released.
  • Restrict network access to the MCP File Handler service, limiting connections to trusted hosts and authenticated users.
  • Sanitize and validate all file path inputs in the server code, rejecting any that contain directory traversal sequences such as ".." or absolute paths.

Generated by OpenCVE AI on May 5, 2026 at 06:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 05:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in 54yyyu code-mcp up to 4cfc4643541a110c906d93635b391bf7e357f4a8. The affected element is the function is_safe_path of the file src/code_mcp/server.py of the component MCP File Handler. Such manipulation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
Title 54yyyu code-mcp MCP File server.py is_safe_path path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-05T04:00:21.402Z

Reserved: 2026-05-04T21:24:12.293Z

Link: CVE-2026-7811

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T05:16:00.537

Modified: 2026-05-05T05:16:00.537

Link: CVE-2026-7811

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T06:30:17Z

Weaknesses