Vulnerability Description
A vulnerability has been found in ravenwits mcp-server-arangodb up to 0.4.7. This affects the function arango_backup of the file src/tools.ts of the component MCP Interface. Such manipulation of the argument outputDir leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/BruceJqs/public_exp/issues/34
- https://github.com/ravenwits/mcp-server-arangodb/
- https://github.com/ravenwits/mcp-server-arangodb/issues/7
- https://vuldb.com/submit/806913
- https://vuldb.com/vuln/360891
- https://vuldb.com/vuln/360891/cti
FAQ
What is CVE-2026-7715?
CVE-2026-7715 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability has been found in ravenwits mcp-server-arangodb up to 0.4.7. This affects the function arango_backup of the file src/tools.ts of the component MCP Interface. Such manipulation of the a...
How severe is CVE-2026-7715?
CVE-2026-7715 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7715?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.