We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
All versions of the package mcp-markdownify-server are vulnerable to Files or Directories Accessible to External Parties via the get-markdown-file tool. An attacker can craft a prompt that, once accessed by the MCP host, will allow it to read arbitrary files from the host running the server.
Reserved 2025-05-27 | Published 2025-05-29 | Updated 2025-05-29 | Assigner snykFiles or Directories Accessible to External Parties
Raul Onitza-Klugman (Snyk Security Research)
security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249193
github.com/...ommit/3a6b202d088ef7acb8be84bc09515f41a2b1a9df
github.com/...4ce22df268d02dd478a7f3b/src/Markdownify.ts#L94
Support options