VYPR
Medium severity6.3NVD Advisory· Published Apr 30, 2026· Updated Apr 30, 2026

CVE-2026-7445

CVE-2026-7445

Description

A security vulnerability has been detected in ZachHandley ZMCPTools up to 0.2.2. Affected by this issue is some unknown functionality of the file src/managers/ResourceManager.ts of the component MCP Log Resource Handler. The manipulation of the argument dirname leads to path traversal. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in ZMCPTools up to 0.2.2 allows remote attackers to read arbitrary files via the MCP log resource handler.

The vulnerability resides in the MCP log resource handling code of ZMCPTools, specifically in src/managers/ResourceManager.ts. The resources/read handler processes a user-controlled logs://{dirname}/content?file={filename} URI and constructs a filesystem path without validating that the resolved path remains within the intended log directory [2][3]. This lack of input sanitization constitutes a classic path traversal flaw (CWE-22).

An attacker with access to the MCP interface can supply ../ sequences in the dirname parameter, causing the server to resolve paths outside the designated log folder. The untrusted input flows from the URI originates from a request handled in McpServer.ts (lines 540–544) and propagates through the resource manager's URI parsing and file reading routines [2][3]. No authentication is required beyond the ability to send requests to the MCP server.

The impact is arbitrary local file disclosure. An attacker could read sensitive system files (e.g., /etc/hosts) or other files accessible to the server process [2][3]. As ZMCPTools is designed for multi-agent orchestration and often run with heightened permissions (the project documentation advises using --dangerously-skip-permissions), the potential for exposure of accessing credentials or configuration files is elevated [1].

The vulnerability was responsibly disclosed to the project maintainer via an issue report on April 14, 2026, but no fix has been released as of the publication date CVE publication date [2][3]. Users should restrict network access to the MCP server and monitor the repository for a patched version.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.