CVE-2026-7318
Received Received - Intake
Path Traversal in elie mcp-project search_papers Function

Publication date: 2026-04-28

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was detected in elie mcp-project 0.1.0. The affected element is the function search_papers of the file research_server.py. The manipulation of the argument topic results in path traversal. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-28
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-29
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
elie mcp-project 0.1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the elie mcp-project version 0.1.0, specifically in the function search_papers within the file research_server.py. It involves manipulation of the argument 'topic' which leads to a path traversal issue. This means an attacker can manipulate input to access files or directories outside the intended scope.

Exploitation requires local access to the system, and the exploit code is publicly available. The project maintainers were informed early but have not yet responded.


How can this vulnerability impact me? :

The vulnerability allows an attacker with local access to perform path traversal by manipulating the 'topic' argument in the search_papers function. This can lead to unauthorized reading or modification of files outside the intended directory.

The impact includes potential confidentiality, integrity, and availability losses, as indicated by the CVSS v3.1 score of 5.9 with low attack complexity but requiring local access.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart