CVE-2026-7319

HIGH

elinsky execution-system-mcp add_action Tool server.py _get_context_file_path path traversal

Title source: cna
STIX 2.1

Description

A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.

Scores

CVSS v3 7.3
EPSS 0.0008
EPSS Percentile 22.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable yes
Technical Impact partial

Details

CWE
CWE-22
Status published
Products (1)
elinsky/execution-system-mcp 0.1.0
Published Apr 28, 2026
Tracked Since Apr 29, 2026