{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/products/matlab-mcp-server/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":7.3,"id":"CVE-2026-7272"}],"_cs_exploited":false,"_cs_products":["matlab-mcp-server"],"_cs_severities":["high"],"_cs_tags":["path-traversal","web-vulnerability"],"_cs_type":"advisory","_cs_vendors":["WilliamCloudQi"],"content_html":"\u003cp\u003eA path traversal vulnerability, identified as CVE-2026-7272, affects WilliamCloudQi\u0026rsquo;s matlab-mcp-server up to commit ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca. The vulnerability resides within the MCP Interface component, specifically in the \u003ccode\u003egenerate_matlab_code/execute_matlab_code\u003c/code\u003e function of the \u003ccode\u003esrc/index.ts\u003c/code\u003e file. A remote attacker can exploit this flaw by manipulating the \u003ccode\u003escriptPath\u003c/code\u003e argument, allowing them to traverse the file system and potentially access sensitive files or execute arbitrary code on the server. This vulnerability is remotely exploitable, and an exploit is publicly available. The vendor was notified but has not yet responded. This poses a significant risk to systems running vulnerable versions of matlab-mcp-server.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eThe attacker identifies a vulnerable instance of WilliamCloudQi matlab-mcp-server running a version up to ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious HTTP request targeting the \u003ccode\u003egenerate_matlab_code\u003c/code\u003e or \u003ccode\u003eexecute_matlab_code\u003c/code\u003e function.\u003c/li\u003e\n\u003cli\u003eThe malicious request includes a manipulated \u003ccode\u003escriptPath\u003c/code\u003e argument containing path traversal sequences (e.g., \u003ccode\u003e../\u003c/code\u003e, \u003ccode\u003e..%2f\u003c/code\u003e).\u003c/li\u003e\n\u003cli\u003eThe server-side code, without proper validation, uses the attacker-controlled \u003ccode\u003escriptPath\u003c/code\u003e to access a file.\u003c/li\u003e\n\u003cli\u003eThe attacker uses the path traversal to navigate to a sensitive file outside the intended directory (e.g., \u003ccode\u003e/etc/passwd\u003c/code\u003e).\u003c/li\u003e\n\u003cli\u003eThe server reads the contents of the arbitrary file due to the path traversal.\u003c/li\u003e\n\u003cli\u003eThe server includes the contents of the sensitive file in the response sent back to the attacker.\u003c/li\u003e\n\u003cli\u003eThe attacker retrieves the sensitive information from the server\u0026rsquo;s response, such as configuration files, credentials, or source code.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this vulnerability allows a remote attacker to read arbitrary files on the server. This can lead to the disclosure of sensitive information, including configuration files, credentials, source code, or other data stored on the server\u0026rsquo;s file system. This information can then be used for further attacks, such as privilege escalation or lateral movement within the network. The number of potential victims is unknown, but any system running a vulnerable version of matlab-mcp-server is at risk.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eApply appropriate input validation and sanitization to the \u003ccode\u003escriptPath\u003c/code\u003e argument in the \u003ccode\u003egenerate_matlab_code\u003c/code\u003e and \u003ccode\u003eexecute_matlab_code\u003c/code\u003e functions to prevent path traversal attacks.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rules provided in this brief to your SIEM to detect potential exploitation attempts targeting this vulnerability.\u003c/li\u003e\n\u003cli\u003eMonitor web server logs for suspicious requests containing path traversal sequences (e.g., \u003ccode\u003e../\u003c/code\u003e, \u003ccode\u003e..%2f\u003c/code\u003e) in the \u003ccode\u003escriptPath\u003c/code\u003e parameter.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2024-01-03T12:00:00Z","date_published":"2024-01-03T12:00:00Z","id":"/briefs/2024-01-03-matlab-mcp-server-path-traversal/","summary":"A path traversal vulnerability exists in WilliamCloudQi matlab-mcp-server up to version ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca, allowing a remote attacker to manipulate the scriptPath argument in the generate_matlab_code/execute_matlab_code function to access arbitrary files.","title":"Path Traversal Vulnerability in WilliamCloudQi matlab-mcp-server","url":"https://feed.craftedsignal.io/briefs/2024-01-03-matlab-mcp-server-path-traversal/"}],"language":"en","title":"CraftedSignal Threat Feed — Matlab-Mcp-Server","version":"https://jsonfeed.org/version/1.1"}