๐Ÿ” CVE Alert

CVE-2026-7400

HIGH 7.3

geekgod382 filesystem-mcp-server read_file_tool/write_file_tool server.py is_path_allowed path traversal

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A security vulnerability has been detected in geekgod382 filesystem-mcp-server 1.0.0. This issue affects the function is_path_allowed of the file server.py of the component read_file_tool/write_file_tool. Such manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.1.0 is capable of addressing this issue. The name of the patch is 45364545fc60dc80aadcd4379f08042d3d3d292e. Upgrading the affected component is advised.

CWE CWE-22
Vendor geekgod382
Product filesystem-mcp-server
Published Apr 29, 2026
Last Updated Apr 29, 2026
Stay Ahead of the Next One

Get instant alerts for geekgod382 filesystem-mcp-server

Be the first to know when new high vulnerabilities affecting geekgod382 filesystem-mcp-server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

geekgod382 / filesystem-mcp-server
1.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360123 vuldb.com: https://vuldb.com/vuln/360123/cti vuldb.com: https://vuldb.com/submit/803495 github.com: https://github.com/geekgod382/filesystem-mcp-server/issues/1 github.com: https://github.com/geekgod382/filesystem-mcp-server/commit/45364545fc60dc80aadcd4379f08042d3d3d292e github.com: https://github.com/geekgod382/filesystem-mcp-server/releases/tag/v1.1.0 github.com: https://github.com/geekgod382/filesystem-mcp-server/

Credits

๐Ÿ” LargeW (VulDB User)