๐Ÿ” CVE Alert

CVE-2026-7404

HIGH 7.3

getsimpletool mcpo-simple-server base_manager.py delete_shared_prompt path traversal

CVSS Score
7.3
EPSS Score
0.0%
EPSS Percentile
0th

A weakness has been identified in getsimpletool mcpo-simple-server up to 0.2.0. Affected is the function delete_shared_prompt of the file src/mcpo_simple_server/services/prompt_manager/base_manager.py. This manipulation of the argument detail causes relative path traversal. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-23 CWE-22
Vendor getsimpletool
Product mcpo-simple-server
Published Apr 29, 2026
Stay Ahead of the Next One

Get instant alerts for getsimpletool mcpo-simple-server

Be the first to know when new high vulnerabilities affecting getsimpletool mcpo-simple-server are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

getsimpletool / mcpo-simple-server
0.1 0.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360140 vuldb.com: https://vuldb.com/vuln/360140/cti vuldb.com: https://vuldb.com/submit/803612 github.com: https://github.com/getsimpletool/mcpo-simple-server/issues/4 github.com: https://github.com/getsimpletool/mcpo-simple-server/

Credits

๐Ÿ” LargeW (VulDB User) VulDB CNA Team