CVE-2025-53109
Awaiting Analysis Awaiting Analysis - Queue
BaseFortify

Publication date: 2025-07-02

Last updated on: 2025-07-03

Assigner: GitHub, Inc.

Description
Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). Versions of Filesystem prior to 0.6.4 or 2025.7.01 could allow access to unintended files via symlinks within allowed directories. Users are advised to upgrade to 0.6.4 or 2025.7.01 resolve.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-02
Last Modified
2025-07-03
Generated
2026-05-07
AI Q&A
2025-07-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-59 The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability affects Model Context Protocol Servers, specifically versions of Filesystem prior to 0.6.4 or 2025.7.01. It allows access to unintended files via symbolic links (symlinks) within directories that are otherwise allowed. This means an attacker could potentially use symlinks to access files that should not be accessible.


How can this vulnerability impact me? :

The vulnerability can lead to unauthorized access to files that should be restricted. This could result in exposure of sensitive information or data leakage, potentially compromising system security and user privacy.


What immediate steps should I take to mitigate this vulnerability?

Users are advised to upgrade to version 0.6.4 or 2025.7.01 of the Model Context Protocol Servers to resolve the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart