VYPR
Medium severity5.9NVD Advisory· Published Apr 28, 2026· Updated Apr 29, 2026

CVE-2026-7318

CVE-2026-7318

Description

A vulnerability was detected in elie mcp-project 0.1.0. The affected element is the function search_papers of the file research_server.py. The manipulation of the argument topic results in path traversal. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in elie mcp-project 0.1.0 allows local attackers to write arbitrary JSON files via the search_papers function.

Vulnerability

Overview

CVE-2026-7318 is a path traversal vulnerability (CWE-22) has been identified in elie mcp-project version 0.1.0, specifically in the search_papers function within research_server.py. The function constructs a filesystem path by joining a base directory (PAPER_DIR = "papers") with the user-supplied topic argument after only lowercasing and replacing spaces with underscores. This insufficient sanitization allows directory traversal sequences (e.g., ../) to remain intact, enabling an attacker to escape the intended directory [1].

Exploitation

Conditions

The vulnerability is exploitable locally, requiring the attacker to have the ability to invoke the search_papers tool with a crafted topic argument. No authentication is mentioned as a prerequisite, and the attack does not validate or restrict the input before using it in filesystem operations. The exploit has been publicly disclosed, increasing the risk of active use [1].

Impact

A successful attack allows an attacker to create or overwrite or create a papers_info.json file in an arbitrary location on the host filesystem. This could lead to arbitrary JSON file write, potentially enabling further compromise such as overwriting configuration files or planting malicious data that might be executed or interpreted by other services [1].

Mitigation

Status

The vendor was informed via an issue report on April 10, 2026, but has not yet responded or released a fix. As of the publication date (April 28, 2026), no patched version is available. Users are advised to restrict local access to the affected server or apply input validation to the topic parameter as a workaround [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.