๐Ÿ” CVE Alert

CVE-2026-7216

HIGH 7.3

donchelo processing-claude-mcp-bridge create_sketch Tool processing_server.py path traversal

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A weakness has been identified in donchelo processing-claude-mcp-bridge up to e017b20a4b592a45531a6392f494007f04e661bd. Impacted is an unknown function of the file processing_server.py of the component create_sketch Tool. This manipulation of the argument sketch_name causes path traversal. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-22
Vendor donchelo
Product processing-claude-mcp-bridge
Published Apr 28, 2026
Stay Ahead of the Next One

Get instant alerts for donchelo processing-claude-mcp-bridge

Be the first to know when new high vulnerabilities affecting donchelo processing-claude-mcp-bridge are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

donchelo / processing-claude-mcp-bridge
e017b20a4b592a45531a6392f494007f04e661bd

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/359816 vuldb.com: https://vuldb.com/vuln/359816/cti vuldb.com: https://vuldb.com/submit/802090 github.com: https://github.com/donchelo/processing-claude-mcp-bridge/issues/1 github.com: https://github.com/donchelo/processing-claude-mcp-bridge/

Credits

๐Ÿ” CPT_Penner (VulDB User) VulDB CNA Team