๐Ÿ” CVE Alert

CVE-2026-7149

HIGH 7.3

dexhunter kaggle-mcp server.py prepare_kaggle_dataset path traversal

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability has been found in dexhunter kaggle-mcp up to 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d. This vulnerability affects the function prepare_kaggle_dataset of the file src/kaggle_mcp/server.py. The manipulation of the argument competition_id leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-22
Vendor dexhunter
Product kaggle-mcp
Published Apr 27, 2026
Last Updated Apr 27, 2026
Stay Ahead of the Next One

Get instant alerts for dexhunter kaggle-mcp

Be the first to know when new high vulnerabilities affecting dexhunter kaggle-mcp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

dexhunter / kaggle-mcp
406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359748 vuldb.com: https://vuldb.com/vuln/359748/cti vuldb.com: https://vuldb.com/submit/802052 github.com: https://github.com/dexhunter/kaggle-mcp/issues/1 github.com: https://github.com/dexhunter/kaggle-mcp/

Credits

๐Ÿ” MidA (VulDB User) VulDB CNA Team