CVE-2025-67366
BaseFortify
Publication date: 2026-01-07
Last updated on: 2026-01-08
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| sylphxltd | filesystem-mcp | 0.5.8 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-23 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a critical path traversal issue in version 0.5.8 of the filesystem-mcp server. It occurs because the path validation function checks the path before resolving symbolic links (symlinks), while the file reading function automatically resolves symlinks during access. Attackers can exploit this by placing symlinks inside allowed directories that point to files outside the intended scope, thereby bypassing directory restrictions and gaining unauthorized access to external files.
How can this vulnerability impact me? :
This vulnerability can allow attackers to access files outside the intended directory boundaries of the filesystem-mcp server. This unauthorized file access could lead to exposure of sensitive information, data leakage, or manipulation of files that should be protected, potentially compromising system security and user data.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, ensure that the filesystem-mcp server is updated to a version that fixes the path traversal issue in the read_content tool. Until a fix is available, avoid using version 0.5.8 or restrict access to the MCP server to trusted users only. Additionally, monitor and control symlink usage within the allowed directories to prevent attackers from leveraging symlinks to access unauthorized files. [1]