๐Ÿ” CVE Alert

CVE-2026-7384

HIGH 7.3

ezequiroga mcp-bases research_server.py search_papers path traversal

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was detected in ezequiroga mcp-bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea39/c630b8ab0f970614d42da8e566e9c0d15a16414c. This impacts the function search_papers of the file research_server.py. Performing a manipulation of the argument topic results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-22
Vendor ezequiroga
Product mcp-bases
Published Apr 29, 2026
Last Updated Apr 29, 2026
Stay Ahead of the Next One

Get instant alerts for ezequiroga mcp-bases

Be the first to know when new high vulnerabilities affecting ezequiroga mcp-bases are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

ezequiroga / mcp-bases
357ca19c7a49a9b9cb2ef639b366f03aba8bea39 c630b8ab0f970614d42da8e566e9c0d15a16414c

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360106 vuldb.com: https://vuldb.com/vuln/360106/cti vuldb.com: https://vuldb.com/submit/803095 github.com: https://github.com/ezequiroga/mcp-bases/issues/2 github.com: https://github.com/ezequiroga/mcp-bases/

Credits

๐Ÿ” LittleW (VulDB User) VulDB CNA Team