@sylphxltd/filesystem-mcp v0.5.8 is an MCP server that provides file content reading functionality. Version 0.5.8 of filesystem-mcp contains a critical path traversal vulnerability in its "read_content" tool. This vulnerability arises from improper symlink handling in the path validation mechanism: the resolvePath function checks path validity before resolving symlinks, while fs.readFile resolves symlinks automatically during file access. This allows attackers to bypass directory restrictions by leveraging symlinks within the allowed directory that point to external files, enabling unauthorized access to files outside the intended operational scope.
Metrics
Affected Vendors & Products
References
History
Thu, 29 Jan 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sylphx
Sylphx filesystem-mcp |
|
| CPEs | cpe:2.3:a:sylphx:filesystem-mcp:0.5.8:*:*:*:*:node.js:*:* | |
| Vendors & Products |
Sylphx
Sylphx filesystem-mcp |
Wed, 07 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-23 | |
| Metrics |
cvssV3_1
|
Wed, 07 Jan 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | @sylphxltd/filesystem-mcp v0.5.8 is an MCP server that provides file content reading functionality. Version 0.5.8 of filesystem-mcp contains a critical path traversal vulnerability in its "read_content" tool. This vulnerability arises from improper symlink handling in the path validation mechanism: the resolvePath function checks path validity before resolving symlinks, while fs.readFile resolves symlinks automatically during file access. This allows attackers to bypass directory restrictions by leveraging symlinks within the allowed directory that point to external files, enabling unauthorized access to files outside the intended operational scope. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-01-07T17:18:19.832Z
Reserved: 2025-12-08T00:00:00.000Z
Link: CVE-2025-67366
Updated: 2026-01-07T17:18:13.992Z
Status : Analyzed
Published: 2026-01-07T17:16:01.893
Modified: 2026-01-29T01:02:25.900
Link: CVE-2025-67366
No data.