VYPR
High severity7.3NVD Advisory· Published Apr 28, 2026· Updated Apr 29, 2026

CVE-2026-7212

CVE-2026-7212

Description

A security vulnerability has been detected in edvardlindelof notes-mcp up to 0.1.4. This affects an unknown function of the file notes_mcp.py. The manipulation of the argument root_dir/path leads to path traversal. The attack is possible to be carried out remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Path traversal in notes-mcp up to 0.1.4 allows remote attackers to read, write, or delete arbitrary files outside the configured root directory via crafted path arguments.

Vulnerability

Overview

CVE-2026-7212 is a path traversal vulnerability in edvardlindelof's notes-mcp server up to version 0.1.4. The flaw resides in notes_mcp.py, where file operations (read, write, mkdir, rm, rmdir) construct paths by concatenating the user-supplied path argument with the configured root_dir using root_dir / path without any resolution or boundary check [1][2]. This allows an attacker to inject ../ sequences to escape the intended notes vault.

Exploitation

An attacker who can invoke any of the MCP tools (e.g., through a connected LLM chatbot or direct network access) can supply a path containing ../ to read, write, create, or delete files outside the root_dir [1]. The attack is remotely exploitable as the MCP server is typically exposed to network clients [4]. No authentication is required beyond the ability to call the tools.

Impact

Successful exploitation enables arbitrary file read (exfiltration of sensitive data), arbitrary file write (potential code injection or configuration modification), and arbitrary file deletion (denial of service) on the host filesystem [1]. The impact is limited only by the permissions of the user running the notes-mcp server.

Mitigation

As of the public disclosure date (April 2026), the vendor has not responded to the issue report and no patch is available [1][4]. Users should restrict network access to the MCP server, implement a reverse proxy with path validation, or avoid using the affected versions until a fix is released.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
notes-mcpPyPI
<= 0.1.4

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.