CVE-2026-7400
Description
A security vulnerability has been detected in geekgod382 filesystem-mcp-server 1.0.0. This issue affects the function is_path_allowed of the file server.py of the component read_file_tool/write_file_tool. Such manipulation leads to path traversal. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. Upgrading to version 1.1.0 is capable of addressing this issue. The name of the patch is 45364545fc60dc80aadcd4379f08042d3d3d292e. Upgrading the affected component is advised.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Path traversal in geekgod382 filesystem-mcp-server 1.0.0 allows remote attackers to read/write files outside allowed paths via prefix-check bypass.
Vulnerability
Details
The is_path_allowed function in server.py of filesystem-mcp-server 1.0.0 performs a path traversal check by comparing the absolute path against a list of allowed paths using Python's str.startswith() method. This prefix-based check is insufficient because a path like /home/alice_backup/loot.txt starts with /home/alice if /home/alice is in the allowed list, even though it resides outside the intended directory. [1]
Exploitation
The vulnerability is reachable via any file operation tool exposed by the MCP server, including read_file_tool, write_file_tool, delete_file_tool, and others. An attacker who can send tool calls to the server (remotely, if the server is network-accessible) can craft paths that bypass the prefix check to access files outside the configured ALLOWED_PATHS. No authentication is required beyond the ability to invoke the MCP tools. [1][2]
Impact
Successful exploitation allows an attacker to read, write, delete, or move arbitrary files on the server's filesystem, limited only by the operating system's permissions. Since the default allowed path is the user's home directory, sibling directories (e.g., /home/alice_backup, /home/bob) or other paths sharing a prefix could be targeted. This could lead to data exfiltration, privilege escalation, or system compromise. [1][2]
Mitigation
The vendor has released version 1.1.0, which includes a fix in commit 45364545fc60dc80aadcd4379f08042d3d3d292e. The fix properly resolves paths and ensures that only paths strictly within the allowed directories are permitted. Users are strongly advised to upgrade to version 1.1.0 or later. [3][4]
- filesystem-mcp-server ALLOWED_PATHS Prefix-Check Bypass via `read_file_tool` / `write_file_tool`
- GitHub - geekgod382/filesystem-mcp-server: A Model Context Protocol (MCP) server that provides comprehensive file system access and operations. This server allows AI assistants to interact with your file system through a standardized interface.
- Release v1.1.0 · geekgod382/filesystem-mcp-server
- fixed ALLOWED_PATHS check bypass issue · geekgod382/filesystem-mcp-server@4536454
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 1.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
0No linked articles in our index yet.