geekgod382 filesystem-mcp-server Path Traversal Vulnerability (CVE-2026-7400)
A path traversal vulnerability exists in geekgod382 filesystem-mcp-server version 1.0.0 allowing remote attackers to access unauthorized files due to insufficient path validation in the is_path_allowed function.
A critical path traversal vulnerability, identified as CVE-2026-7400, affects geekgod382 filesystem-mcp-server version 1.0.0. This vulnerability resides within the is_path_allowed function in the server.py file, specifically in the read_file_tool/write_file_tool component. A remote attacker can exploit this weakness to bypass intended access restrictions and potentially read or write sensitive files outside the designated directories. Publicly available exploit code exists, increasing the urgency for remediation. Upgrade to version 1.1.0 to apply the patch (45364545fc60dc80aadcd4379f08042d3d3d292e) and mitigate this risk. This vulnerability allows attackers to potentially gain unauthorized access to the underlying system.
Attack Chain
- The attacker identifies a vulnerable instance of
filesystem-mcp-serverversion 1.0.0 exposed to the network. - The attacker crafts a malicious request targeting the
read_file_toolorwrite_file_toolcomponent. - The crafted request includes a path traversal sequence (e.g.,
../) within the file path parameter. - The
is_path_allowedfunction fails to properly sanitize the input path, allowing the traversal sequence to bypass intended restrictions. - The application processes the request, accessing a file outside the intended directory.
- If using
read_file_tool, the contents of the unauthorized file are returned to the attacker. - If using
write_file_tool, the attacker can overwrite legitimate files, potentially injecting malicious code. - Successful exploitation allows the attacker to read sensitive information or achieve arbitrary code execution on the server.
Impact
Successful exploitation of this path traversal vulnerability (CVE-2026-7400) can allow an attacker to read arbitrary files from the affected server, potentially exposing sensitive data such as configuration files, credentials, or internal documents. If the write_file_tool is exploited, the attacker might overwrite critical system files, leading to denial of service or arbitrary code execution. This issue affects systems running geekgod382 filesystem-mcp-server version 1.0.0.
Recommendation
- Upgrade to geekgod382 filesystem-mcp-server version 1.1.0 to apply the patch (45364545fc60dc80aadcd4379f08042d3d3d292e) that fixes CVE-2026-7400.
- Deploy the Sigma rule “filesystem-mcp-server Path Traversal Attempt” to detect potential exploitation attempts against the filesystem-mcp-server.
- Monitor web server logs for suspicious requests containing path traversal sequences (
../,..\\) targeting file access endpoints, as this may indicate exploitation attempts. - Implement input validation and sanitization measures to prevent path traversal attacks, even after upgrading, as defense-in-depth.
Detection coverage 2
filesystem-mcp-server Path Traversal Attempt
highDetects potential path traversal attempts targeting filesystem-mcp-server by looking for common path traversal sequences in request URIs.
filesystem-mcp-server Malicious File Access
criticalDetects potential access to sensitive files via path traversal by monitoring the file names accessed.
Detection queries are kept inside the platform. Get full rules →