PT-2026-35832 · Elinsky · Execution-System-Mcp
Littlew
·
Published
2026-04-28
·
Updated
2026-04-28
·
CVE-2026-7319
CVSS v2.0
7.5
High
| AV:N/AC:L/Au:N/C:P/I:P/A:P |
A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function get context file path of the file src/execution system mcp/server.py of the component add action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.
Exploit
Fix
Path traversal
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Execution-System-Mcp