Flux159 mcp-game-asset-gen Path Traversal Vulnerability
A path traversal vulnerability exists in Flux159 mcp-game-asset-gen version 0.1.0, where manipulation of the `statusFile` argument in the `image_to_3d_async` function allows for remote exploitation.
A path traversal vulnerability, identified as CVE-2026-7594, has been discovered in Flux159 mcp-game-asset-gen version 0.1.0. The vulnerability resides within the image_to_3d_async function located in the src/index.ts file of the MCP Interface component. Successful exploitation allows a remote attacker to manipulate the statusFile argument, potentially leading to unauthorized file access and modification. Public exploits are available, increasing the risk of widespread exploitation. The project maintainers were notified via an issue report, but have not yet addressed the vulnerability. This lack of response, coupled with the existence of public exploits, elevates the urgency for defenders.
Attack Chain
- The attacker identifies a vulnerable instance of mcp-game-asset-gen 0.1.0 running on a remote server.
- The attacker crafts a malicious HTTP request targeting the
image_to_3d_asyncfunction. - Within the request, the attacker manipulates the
statusFileargument to include path traversal sequences (e.g., “../”). - The server-side application processes the request, using the attacker-controlled
statusFilevalue to construct a file path. - Due to insufficient input validation, the path traversal sequences are not properly sanitized.
- The application attempts to read or write to a file outside the intended directory, based on the manipulated path.
- If successful, the attacker gains unauthorized access to sensitive files or overwrites critical system files.
- The attacker leverages the file access to further compromise the system, potentially leading to code execution or data exfiltration.
Impact
Successful exploitation of this path traversal vulnerability could allow attackers to read sensitive files, overwrite critical system files, or even achieve remote code execution on the affected server. This could lead to data breaches, system instability, or complete server compromise. Given the availability of public exploits, organizations using mcp-game-asset-gen 0.1.0 are at immediate risk.
Recommendation
- Apply input validation and sanitization to the
statusFileargument within theimage_to_3d_asyncfunction to prevent path traversal, addressing CVE-2026-7594. - Monitor web server logs for suspicious requests containing path traversal sequences (e.g., “../”) in the
statusFileparameter using the provided Sigma rule. - Implement the Sigma rule targeting process creation events related to the exploitation of CVE-2026-7594.
Detection coverage 2
Detect Path Traversal Attempt via statusFile Parameter
highDetects attempts to exploit CVE-2026-7594 by identifying path traversal sequences in the statusFile parameter.
Detect Process Creation Related to CVE-2026-7594 Exploitation
criticalDetects potential exploitation of CVE-2026-7594 by monitoring for suspicious process creation events following path traversal attempts.
Detection queries are kept inside the platform. Get full rules →