<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Filesystem-Mcp-Server — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/filesystem-mcp-server/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/filesystem-mcp-server/feed.xml" rel="self" type="application/rss+xml"/><item><title>geekgod382 filesystem-mcp-server Path Traversal Vulnerability (CVE-2026-7400)</title><link>https://feed.craftedsignal.io/briefs/2024-01-filesystem-mcp-server-path-traversal/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-filesystem-mcp-server-path-traversal/</guid><description>A path traversal vulnerability exists in geekgod382 filesystem-mcp-server version 1.0.0 allowing remote attackers to access unauthorized files due to insufficient path validation in the is_path_allowed function.</description><content:encoded><![CDATA[<p>A critical path traversal vulnerability, identified as CVE-2026-7400, affects geekgod382 filesystem-mcp-server version 1.0.0. This vulnerability resides within the <code>is_path_allowed</code> function in the <code>server.py</code> file, specifically in the <code>read_file_tool/write_file_tool</code> component. A remote attacker can exploit this weakness to bypass intended access restrictions and potentially read or write sensitive files outside the designated directories. Publicly available exploit code exists, increasing the urgency for remediation. Upgrade to version 1.1.0 to apply the patch (45364545fc60dc80aadcd4379f08042d3d3d292e) and mitigate this risk. This vulnerability allows attackers to potentially gain unauthorized access to the underlying system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of <code>filesystem-mcp-server</code> version 1.0.0 exposed to the network.</li>
<li>The attacker crafts a malicious request targeting the <code>read_file_tool</code> or <code>write_file_tool</code> component.</li>
<li>The crafted request includes a path traversal sequence (e.g., <code>../</code>) within the file path parameter.</li>
<li>The <code>is_path_allowed</code> function fails to properly sanitize the input path, allowing the traversal sequence to bypass intended restrictions.</li>
<li>The application processes the request, accessing a file outside the intended directory.</li>
<li>If using <code>read_file_tool</code>, the contents of the unauthorized file are returned to the attacker.</li>
<li>If using <code>write_file_tool</code>, the attacker can overwrite legitimate files, potentially injecting malicious code.</li>
<li>Successful exploitation allows the attacker to read sensitive information or achieve arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-7400) can allow an attacker to read arbitrary files from the affected server, potentially exposing sensitive data such as configuration files, credentials, or internal documents. If the write_file_tool is exploited, the attacker might overwrite critical system files, leading to denial of service or arbitrary code execution. This issue affects systems running geekgod382 filesystem-mcp-server version 1.0.0.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to geekgod382 filesystem-mcp-server version 1.1.0 to apply the patch (45364545fc60dc80aadcd4379f08042d3d3d292e) that fixes CVE-2026-7400.</li>
<li>Deploy the Sigma rule &ldquo;filesystem-mcp-server Path Traversal Attempt&rdquo; to detect potential exploitation attempts against the filesystem-mcp-server.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (<code>../</code>, <code>..\\</code>) targeting file access endpoints, as this may indicate exploitation attempts.</li>
<li>Implement input validation and sanitization measures to prevent path traversal attacks, even after upgrading, as defense-in-depth.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7400</category></item></channel></rss>