VYPR
High severity7.3NVD Advisory· Published Apr 28, 2026· Updated Apr 29, 2026

CVE-2026-7216

CVE-2026-7216

Description

A weakness has been identified in donchelo processing-claude-mcp-bridge up to e017b20a4b592a45531a6392f494007f04e661bd. Impacted is an unknown function of the file processing_server.py of the component create_sketch Tool. This manipulation of the argument sketch_name causes path traversal. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Path traversal in donchelo/processing-claude-mcp-bridge allows remote attackers to write arbitrary .pde files outside the intended sketch directory via the sketch_name parameter.

Vulnerability

Overview

The create_sketch tool in processing_server.py concatenates the user-supplied sketch_name directly into filesystem paths using os.path.join() without canonicalization or base-directory enforcement [1][2]. This allows an attacker to inject path traversal sequences such as ..\..\Desktop\evil to escape the intended PROC:\Users\chelo\OneDrive\Documentos\Processing` directory [1].

Exploitation

No authentication is required; the MCP server listens for commands from Claude Desktop, and any client that can invoke the create_sketch tool can supply a malicious sketch_name [1][2]. The server then creates directories and writes .pde files at the attacker-controlled path, enabling arbitrary file creation or overwrite outside the intended Processing sketch root [1].

Impact

An attacker can write arbitrary .pde files to arbitrary locations on the host filesystem, potentially overwriting existing files or planting malicious sketches that could be executed later [1]. The vulnerability is remotely exploitable and proof-of-concept code has been publicly released [1].

Mitigation

As of the report date (April 10, 2026), no fix has been provided by the vendor [1]. The project follows a rolling release model and has not responded to the issue report [1]. Users should restrict access to the MCP server or implement input validation on sketch_name to block traversal sequences until an official patch is available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.