Vulnerability Description
A vulnerability was detected in ezequiroga mcp-bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea39/c630b8ab0f970614d42da8e566e9c0d15a16414c. This impacts the function search_papers of the file research_server.py. Performing a manipulation of the argument topic results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/ezequiroga/mcp-bases/
- https://github.com/ezequiroga/mcp-bases/issues/2
- https://vuldb.com/submit/803095
- https://vuldb.com/vuln/360106
- https://vuldb.com/vuln/360106/cti
FAQ
What is CVE-2026-7384?
CVE-2026-7384 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability was detected in ezequiroga mcp-bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea39/c630b8ab0f970614d42da8e566e9c0d15a16414c. This impacts the function search_papers of the file research_ser...
How severe is CVE-2026-7384?
CVE-2026-7384 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7384?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.