Vulnerability Description
A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/elinsky/execution-system-mcp/
- https://github.com/elinsky/execution-system-mcp/issues/1
- https://vuldb.com/submit/803085
- https://vuldb.com/vuln/359972
- https://vuldb.com/vuln/359972/cti
FAQ
What is CVE-2026-7319?
CVE-2026-7319 is a vulnerability with a CVSS score of 7.3 (HIGH). A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool...
How severe is CVE-2026-7319?
CVE-2026-7319 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7319?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.