PT-2026-35832 · Elinsky · Execution-System-Mcp

Littlew

·

Published

2026-04-28

·

Updated

2026-04-28

·

CVE-2026-7319

CVSS v2.0

7.5

High

AV:N/AC:L/Au:N/C:P/I:P/A:P
A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function get context file path of the file src/execution system mcp/server.py of the component add action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.

Exploit

Fix

Path traversal

Weakness Enumeration

Related Identifiers

CVE-2026-7319

Affected Products

Execution-System-Mcp