CVE-2026-7400
geekgod382 filesystem-mcp-server read_file_tool/write_file_tool server.py is_path_allowed path traversal
CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th
A security vulnerability has been detected in geekgod382 filesystem-mcp-server 1.0.0. This issue affects the function is_path_allowed of the file server.py of the component read_file_tool/write_file_tool. Such manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.1.0 is capable of addressing this issue. The name of the patch is 45364545fc60dc80aadcd4379f08042d3d3d292e. Upgrading the affected component is advised.
| CWE | CWE-22 |
| Vendor | geekgod382 |
| Product | filesystem-mcp-server |
| Published | Apr 29, 2026 |
| Last Updated | Apr 29, 2026 |
Stay Ahead of the Next One
Get instant alerts for geekgod382 filesystem-mcp-server
Be the first to know when new high vulnerabilities affecting geekgod382 filesystem-mcp-server are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
geekgod382 / filesystem-mcp-server
1.0.0
References
vuldb.com: https://vuldb.com/vuln/360123 vuldb.com: https://vuldb.com/vuln/360123/cti vuldb.com: https://vuldb.com/submit/803495 github.com: https://github.com/geekgod382/filesystem-mcp-server/issues/1 github.com: https://github.com/geekgod382/filesystem-mcp-server/commit/45364545fc60dc80aadcd4379f08042d3d3d292e github.com: https://github.com/geekgod382/filesystem-mcp-server/releases/tag/v1.1.0 github.com: https://github.com/geekgod382/filesystem-mcp-server/
Credits
๐ LargeW (VulDB User)