CVE-2026-7319
A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.
Ver en NVDAnálisis
This vulnerability affects execution-system-mcp, a specific Model Context Protocol (MCP) server for LLMs with very low distribution. While it is a remote path traversal bug with a public exploit, the tool is a niche utility and not a standard part of the MexicoDev stack or general server infrastructure.
Severidad
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:LCWE-22EPSS
Descripción técnica
A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.