Description
A vulnerability has been found in dexhunter kaggle-mcp up to 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d. This vulnerability affects the function prepare_kaggle_dataset of the file src/kaggle_mcp/server.py. The manipulation of the argument competition_id leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. This product adopts a rolling release strategy to maintain continuous delivery. Therefore, version details for affected or updated releases cannot be specified. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
Timeline
| 2026-04-26: | Advisory disclosed |
| 2026-04-26: | VulDB entry created |
| 2026-04-26: | VulDB entry last update |
Credits
MidA (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/359748 (VDB-359748 | dexhunter kaggle-mcp server.py prepare_kaggle_dataset path traversal)
vuldb.com/vuln/359748/cti (VDB-359748 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/802052 (Submit #802052 | dexhunter kaggle-mcp 0.1.0 Path Traversal)
github.com/dexhunter/kaggle-mcp/issues/1
github.com/dexhunter/kaggle-mcp/