Skip to content
CVSS 7.3 · HIGH

CVE-2026-7594

A vulnerability was detected in Flux159 mcp-game-asset-gen 0.1.0. Affected is the function image_to_3d_async of the file src/index.ts of the component MCP Interface. The manipulation of the argument statusFile results in path traversal. The attack can be executed remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Ver en NVD

Análisis

This path traversal vulnerability affects a very niche AI-related utility for game asset generation with low adoption. Although the exploit is public, the software is not a common part of the development or infrastructure stack for the community.

Severidad

Puntaje: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Tipo de falla (CWE): CWE-22

EPSS

Probabilidad de explotación (próx. 30 días): 0.0005 (0.0%)
Percentil: 13.9%
EPSS: 2026-05-06

Descripción técnica

A vulnerability was detected in Flux159 mcp-game-asset-gen 0.1.0. Affected is the function image_to_3d_async of the file src/index.ts of the component MCP Interface. The manipulation of the argument statusFile results in path traversal. The attack can be executed remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Publicada: 1/5/2026, 21:16:17
Última modificación: 5/5/2026, 19:17:22

Referencias

InicioEventosBlogRecursosEquipo