<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-7811 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-7811/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-7811/feed.xml" rel="self" type="application/rss+xml"/><item><title>54yyyu code-mcp Path Traversal Vulnerability (CVE-2026-7811)</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-code-mcp-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-code-mcp-path-traversal/</guid><description>A path traversal vulnerability exists in the is_safe_path function of the MCP File Handler component in 54yyyu code-mcp, allowing remote attackers to access sensitive files.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7811, has been discovered in 54yyyu code-mcp, affecting versions up to commit 4cfc4643541a110c906d93635b391bf7e357f4a8. This flaw resides within the <code>is_safe_path</code> function in <code>src/code_mcp/server.py</code>, a part of the MCP File Handler component. The vulnerability enables remote attackers to bypass security restrictions and potentially access unauthorized files and directories on the server.  The exploit is publicly known. The vendor employs rolling releases, making specific version details unavailable, and has not yet responded to the initial vulnerability report. This lack of response and public exploit availability poses a significant risk to systems running the affected code-mcp versions.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable instance of 54yyyu code-mcp running a version with the affected <code>is_safe_path</code> function.</li>
<li>The attacker crafts a malicious HTTP request targeting the MCP File Handler, specifically designed to invoke the vulnerable <code>is_safe_path</code> function.</li>
<li>The crafted request includes a path containing directory traversal sequences (e.g., <code>../</code>) intended to bypass the path validation logic.</li>
<li>The <code>is_safe_path</code> function fails to properly sanitize the input path, allowing the traversal sequences to be processed.</li>
<li>The application attempts to access a file or directory outside of the intended base directory based on the attacker-controlled path.</li>
<li>The server reads the contents of the file or directory and includes it in the HTTP response.</li>
<li>The attacker receives the sensitive information, such as configuration files or source code.</li>
<li>The attacker can then use this information to further compromise the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability can allow attackers to read sensitive files from the server hosting the 54yyyu code-mcp application. This may include configuration files, source code, or other data that could aid in further attacks, such as privilege escalation or lateral movement. Since the exploit is publicly available, unpatched systems are at immediate risk of compromise. The number of affected installations and the specific sectors impacted are currently unknown, but the potential for data breaches and system compromise is significant.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Code-mcp Path Traversal Attempt</code> to identify requests containing suspicious path traversal sequences in the <code>cs-uri-query</code> field of web server logs.</li>
<li>Enable web server logging to capture HTTP requests and responses, which is required for the Sigma rule to function correctly (logsource: <code>webserver</code>).</li>
<li>Since specific patched versions are unavailable due to the rolling release model, monitor the vendor&rsquo;s code repository for updates to the <code>is_safe_path</code> function in <code>src/code_mcp/server.py</code> and deploy the updated code as soon as it becomes available.</li>
<li>Implement a web application firewall (WAF) rule to block requests containing path traversal sequences like <code>../</code> in URL parameters to mitigate the risk proactively.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>CVE-2026-7811</category></item></channel></rss>