CVE-2026-7404
Deferred Deferred - Pending Action
Relative Path Traversal in mcpo-simple-server

Publication date: 2026-04-29

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in getsimpletool mcpo-simple-server up to 0.2.0. Affected is the function delete_shared_prompt of the file src/mcpo_simple_server/services/prompt_manager/base_manager.py. This manipulation of the argument detail causes relative path traversal. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-29
Last Modified
2026-04-29
Generated
2026-05-06
AI Q&A
2026-04-30
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
getsimpletool mcpo-simple-server to 0.2.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CWE-23 The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows remote attackers to perform relative path traversal, potentially leading to unauthorized access, modification, or deletion of sensitive files. This can compromise the confidentiality, integrity, and availability of data.

Such unauthorized access and manipulation of sensitive data could lead to non-compliance with data protection regulations and standards like GDPR and HIPAA, which require strict controls over access to personal and sensitive information.

Specifically, the exposure or alteration of sensitive files due to this vulnerability could result in breaches of confidentiality and integrity requirements mandated by these regulations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for attempts to invoke the delete_shared_prompt function with malicious path traversal payloads in the detail parameter, such as sequences containing '../' or absolute paths.

Since the vulnerability involves filesystem path manipulation, detection can include checking logs or network traffic for suspicious requests targeting the vulnerable endpoint with traversal patterns.

No specific detection commands are provided, but general approaches include:

  • Using network monitoring tools (e.g., tcpdump, Wireshark) to capture and analyze requests containing suspicious path traversal strings.
  • Searching server logs for requests to delete_shared_prompt with parameters containing '../' or absolute paths.
  • On the server, using commands like `grep -r "../" /path/to/logs` to find potential traversal attempts in logs.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting filesystem operations to an allowlisted root directory and enforcing strict validation of input paths.

Specifically, you should:

  • Implement canonicalization of file paths before any filesystem operation to prevent traversal sequences from escaping intended directories.
  • Reject or sanitize any input containing path traversal tokens such as '../' or absolute paths.
  • Replace free-form path inputs with structured identifiers that map to safe locations.
  • If possible, restrict network access to the vulnerable endpoint to trusted users or networks.

Since no official fix is available yet, these mitigations can reduce the risk of exploitation.


Can you explain this vulnerability to me?

This vulnerability exists in the getsimpletool mcpo-simple-server up to version 0.2.0, specifically in the function delete_shared_prompt located in the file src/mcpo_simple_server/services/prompt_manager/base_manager.py.

The issue is caused by improper handling of the argument 'detail', which allows for relative path traversal. This means an attacker can manipulate the input to access files or directories outside the intended scope.

The attack can be initiated remotely, and the exploit code has been publicly released, increasing the risk of exploitation.


How can this vulnerability impact me? :

Exploitation of this vulnerability can allow an attacker to access or manipulate files outside the intended directory structure on the affected server.

This can lead to unauthorized disclosure of sensitive information, modification or deletion of important files, and potentially further compromise of the system.

Since the attack can be performed remotely without authentication, it poses a significant security risk.


Can you explain this vulnerability to me?

CVE-2026-7404 is a Path Traversal vulnerability in the getsimpletool mcpo-simple-server, specifically in the delete_shared_prompt function. The vulnerability occurs because the server uses attacker-controlled input in filesystem paths without proper validation or canonicalization. This allows an attacker to manipulate the input to traverse directories outside the intended scope, potentially accessing, modifying, or deleting arbitrary files on the server.

The issue arises from the lack of checks to prevent traversal sequences like '../' or absolute paths, enabling attackers to escape the designated directory boundaries. The vulnerability can be exploited remotely without authentication by sending a malicious detail parameter to the delete_shared_prompt function.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including unauthorized access to sensitive files, modification or deletion of important data, and potential disruption of service if critical files are affected.

  • Confidentiality impact: Sensitive files could be exposed to unauthorized users.
  • Integrity impact: Attackers could alter or delete files, compromising data integrity.
  • Availability impact: Deletion or modification of critical files could disrupt the availability of the service.

The vulnerability has a high severity score (CVSS v3.1 suggested as 9.8) due to the potential for full filesystem compromise.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for attempts to invoke the delete_shared_prompt function with path traversal payloads in the detail parameter, such as sequences containing '../' or absolute paths that escape the intended directory.

Since the vulnerability involves filesystem path manipulation, detection can include searching server logs or network traffic for suspicious requests targeting the delete_shared_prompt endpoint with traversal patterns.

A practical approach is to use command-line tools to scan logs or live traffic for these patterns. For example, using grep to find suspicious requests in server logs:

  • grep -r "delete_shared_prompt" /path/to/logs | grep "\.\./"
  • tcpdump or Wireshark filters to capture HTTP requests containing '../' in parameters.

Additionally, static code analysis tools like CodeQL can be used to audit the source code for unsafe path handling, as was done to discover this vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting filesystem operations to an allowlisted root directory and enforcing strict validation of input paths to reject traversal tokens like '../'.

Canonicalizing paths before any filesystem operation is critical to ensure that paths do not escape the intended directory boundaries.

Replacing free-form path inputs with structured identifiers can reduce the risk of injection of malicious paths.

Until an official fix is released, monitoring and blocking suspicious requests targeting the vulnerable function can help reduce exposure.

Adding regression tests for traversal payloads in the development process is recommended to prevent reintroduction of the vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart