CVE-2026-7403
Description
A security flaw has been discovered in geldata gel-mcp 0.1.0. This impacts the function list_rules/fetch_rule of the file src/gel_mcp/server.py. The manipulation of the argument rule_name results in path traversal. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A path traversal vulnerability in gel-mcp 0.1.0 allows remote attackers to read arbitrary files via the fetch_rule tool.
Vulnerability
Overview CVE-2026-7403 is a path traversal vulnerability in geldata gel-mcp 0.1.0, specifically in the fetch_rule function within src/gel_mcp/server.py. The function joins the attacker-controlled rule_name argument directly under the RULES_DIR path without sanitization, allowing traversal sequences like ../../../../../pyproject.toml to escape the intended directory [1]. This is a classic instance of CWE-73: External Control of File Name or Path [1].
Exploitation
An attacker can exploit this remotely by sending a crafted fetch_rule request with path traversal characters in the rule_name parameter. No authentication is required if the MCP server is exposed to the network. The attack does not require any special privileges beyond network access to the server's tool interface [1]. A public exploit has been released, increasing the risk of active attacks [description].
Impact
Successful exploitation allows an attacker to read arbitrary files on the server filesystem with the privileges of the gel-mcp process. This could lead to disclosure of sensitive configuration files, source code, or credentials. The list_rules function is not affected as it only lists files matching *.md in the rules directory, but fetch_rule directly exposes the traversal [1].
Mitigation
Status As of the report date (April 13, 2026), no fix has been released, and the vendor has not responded to the issue [1]. Users should restrict network access to the gel-mcp service to trusted clients only, or disable the fetch_rule tool if possible until a patched version is available.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.