Metrics
Affected Vendors & Products
Thu, 30 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Geekgod382
Geekgod382 filesystem-mcp-server |
|
| Vendors & Products |
Geekgod382
Geekgod382 filesystem-mcp-server |
Wed, 29 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in geekgod382 filesystem-mcp-server 1.0.0. This issue affects the function is_path_allowed of the file server.py of the component read_file_tool/write_file_tool. Such manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.1.0 is capable of addressing this issue. The name of the patch is 45364545fc60dc80aadcd4379f08042d3d3d292e. Upgrading the affected component is advised. | |
| Title | geekgod382 filesystem-mcp-server read_file_tool/write_file_tool server.py is_path_allowed path traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-29T19:57:13.981Z
Reserved: 2026-04-29T11:33:40.612Z
Link: CVE-2026-7400
Updated: 2026-04-29T19:56:49.523Z
Status : Deferred
Published: 2026-04-29T20:16:31.393
Modified: 2026-04-29T21:16:21.590
Link: CVE-2026-7400
No data.