CVE-2026-7216
Description
A weakness has been identified in donchelo processing-claude-mcp-bridge up to e017b20a4b592a45531a6392f494007f04e661bd. Impacted is an unknown function of the file processing_server.py of the component create_sketch Tool. This manipulation of the argument sketch_name causes path traversal. Remote exploitation of the attack is possible. The exploit has been made available to the public and could be used for attacks. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Path traversal in donchelo/processing-claude-mcp-bridge allows remote attackers to write arbitrary .pde files outside the intended sketch directory via the sketch_name parameter.
Vulnerability
Overview
The create_sketch tool in processing_server.py concatenates the user-supplied sketch_name directly into filesystem paths using os.path.join() without canonicalization or base-directory enforcement [1][2]. This allows an attacker to inject path traversal sequences such as ..\..\Desktop\evil to escape the intended PROC:\Users\chelo\OneDrive\Documentos\Processing` directory [1].
Exploitation
No authentication is required; the MCP server listens for commands from Claude Desktop, and any client that can invoke the create_sketch tool can supply a malicious sketch_name [1][2]. The server then creates directories and writes .pde files at the attacker-controlled path, enabling arbitrary file creation or overwrite outside the intended Processing sketch root [1].
Impact
An attacker can write arbitrary .pde files to arbitrary locations on the host filesystem, potentially overwriting existing files or planting malicious sketches that could be executed later [1]. The vulnerability is remotely exploitable and proof-of-concept code has been publicly released [1].
Mitigation
As of the report date (April 10, 2026), no fix has been provided by the vendor [1]. The project follows a rolling release model and has not responded to the issue report [1]. Users should restrict access to the MCP server or implement input validation on sketch_name to block traversal sequences until an official patch is available.
- processing-claude-mcp-bridge Arbitrary File Write via Sketch Name Traversal
- GitHub - donchelo/processing-claude-mcp-bridge: Integración entre Processing y Claude mediante el Model Context Protocol (MCP). Permite controlar y crear sketches de Processing mediante conversaciones en lenguaje natural con Claude.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.