CVE-2026-7318
Path Traversal in elie mcp-project search_papers Function
Publication date: 2026-04-28
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| elie | mcp-project | 0.1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the elie mcp-project version 0.1.0, specifically in the function search_papers within the file research_server.py. It involves manipulation of the argument 'topic' which leads to a path traversal issue. This means an attacker can manipulate input to access files or directories outside the intended scope.
Exploitation requires local access to the system, and the exploit code is publicly available. The project maintainers were informed early but have not yet responded.
How can this vulnerability impact me? :
The vulnerability allows an attacker with local access to perform path traversal by manipulating the 'topic' argument in the search_papers function. This can lead to unauthorized reading or modification of files outside the intended directory.
The impact includes potential confidentiality, integrity, and availability losses, as indicated by the CVSS v3.1 score of 5.9 with low attack complexity but requiring local access.