CVE-2026-7214
Description
A vulnerability was identified in eghuzefa engineer-your-data up to 0.1.3. This vulnerability affects the function read_file/write_file/list_files/file_inf of the file src/server.py. The manipulation of the argument WORKSPACE_PATH leads to path traversal. The attack may be initiated remotely. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
engineer-your-data MCP server up to v0.1.3 allows path traversal via file tools that ignore the WORKSPACE_PATH restriction, enabling arbitrary file read/write by remote attackers.
The vulnerability is a path traversal in the file operations of the engineer-your-data MCP server. The functions read_file, write_file, list_files, and file_info in src/tools/file_operations.py accept an arbitrary path from the caller and perform file operations without validating that the path remains within the intended WORKSPACE_PATH directory [1]. The downstream code directly uses the supplied path without sanitization, allowing traversal outside the workspace boundary.
Exploitation is trivial: an attacker sends MCP requests with path traversal sequences such as "../" to access files outside the workspace. Since the MCP server exposes these tools without authentication, any client that can reach the server can exploit the vulnerability remotely [1]. The issue report notes that the exploit is publicly available, increasing the risk of widespread attacks.
An attacker can read arbitrary files from the server's filesystem, including configuration files, credentials, or sensitive data. They can also overwrite files, potentially leading to arbitrary code execution if critical system files are modified. This compromises both confidentiality and integrity of the affected system.
As of the report date (April 10, 2026), no patch has been released. The vendor was informed via the GitHub issue but has not responded [1]. Users should restrict network access to the MCP server, apply strict file permissions, or monitor for exploitation attempts. The public availability of exploit code makes action urgent.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.