Description
A security vulnerability has been detected in geekgod382 filesystem-mcp-server 1.0.0. This issue affects the function is_path_allowed of the file server.py of the component read_file_tool/write_file_tool. Such manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.1.0 is capable of addressing this issue. The name of the patch is 45364545fc60dc80aadcd4379f08042d3d3d292e. Upgrading the affected component is advised.
Problem types
Product status
1.1.0
Timeline
| 2026-04-29: | Advisory disclosed |
| 2026-04-29: | VulDB entry created |
| 2026-04-29: | VulDB entry last update |
Credits
LargeW (VulDB User)
References
vuldb.com/vuln/360123 (VDB-360123 | geekgod382 filesystem-mcp-server read_file_tool/write_file_tool server.py is_path_allowed path traversal)
vuldb.com/vuln/360123/cti (VDB-360123 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/803495 (Submit #803495 | geekgod382 filesystem-mcp-server 4e3e83852b1395de0a437bd4fd66376422f4ea0c Path Traversal)
github.com/geekgod382/filesystem-mcp-server/issues/1
github.com/...ommit/45364545fc60dc80aadcd4379f08042d3d3d292e
github.com/...d382/filesystem-mcp-server/releases/tag/v1.1.0
github.com/geekgod382/filesystem-mcp-server/