Impact
A path traversal flaw exists in the dxtController.ts component of huangjunsen0406's xiaozhi-mcphub up to version 1.0.3, where an attacker can manipulate the manifest.name parameter to access files outside the intended directory, allowing viewing or potentially modifying sensitive files on the server and compromising confidentiality and integrity. The vulnerability is triggered by supplying crafted input during remote operations.
Affected Systems
The affected product is the xiaozhi-mcphub project maintained by huangjunsen0406. Versions up to and including 1.0.3 contain the flaw; earlier releases are not specified, and newer releases have not been confirmed patched. Users must check the repository for an updated release or apply the suggested mitigations.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, while the EPSS score is unavailable but a public exploit demonstrates that the flaw can be abused. The vulnerability is not listed in CISA KEV. Attackers likely exploit it remotely by sending crafted requests to the dxtController endpoint, and because no mitigation is in place, the path traversal can result in local file disclosure or modification, raising risk for deployments exposed to the internet.
OpenCVE Enrichment