We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5273



Description

All versions of the package mcp-markdownify-server are vulnerable to Files or Directories Accessible to External Parties via the get-markdown-file tool. An attacker can craft a prompt that, once accessed by the MCP host, will allow it to read arbitrary files from the host running the server.

Reserved 2025-05-27 | Published 2025-05-29 | Updated 2025-05-29 | Assigner snyk


HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:PMEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P

Problem types

Files or Directories Accessible to External Parties

Credits

Raul Onitza-Klugman (Snyk Security Research)

References

security.snyk.io/vuln/SNYK-JS-MCPMARKDOWNIFYSERVER-10249193

github.com/...ommit/3a6b202d088ef7acb8be84bc09515f41a2b1a9df

github.com/...4ce22df268d02dd478a7f3b/src/Markdownify.ts#L94

cve.org (CVE-2025-5273)

nvd.nist.gov (CVE-2025-5273)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5273

Support options

Helpdesk Chat, Email, Knowledgebase