Description
A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.
Problem types
Product status
Timeline
| 2026-04-28: | Advisory disclosed |
| 2026-04-28: | VulDB entry created |
| 2026-04-28: | VulDB entry last update |
Credits
LittleW (VulDB User)
References
vuldb.com/vuln/359972 (VDB-359972 | elinsky execution-system-mcp add_action Tool server.py _get_context_file_path path traversal)
vuldb.com/vuln/359972/cti (VDB-359972 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/803085 (Submit #803085 | elinsky execution-system-mcp 0.1.0 Path Traversal)
github.com/elinsky/execution-system-mcp/issues/1
github.com/elinsky/execution-system-mcp/