CVE-2026-7403 PUBLISHED

geldata gel-mcp server.py fetch_rule path traversal

Assigner: VulDB
Reserved: 29.04.2026 Published: 29.04.2026 Updated: 29.04.2026

A security flaw has been discovered in geldata gel-mcp 0.1.0. This impacts the function list_rules/fetch_rule of the file src/gel_mcp/server.py. The manipulation of the argument rule_name results in path traversal. The attack may be performed from remote. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor geldata
Product gel-mcp
Versions
  • Version 0.1.0 is affected

Credits

  • LargeW (VulDB User) reporter
  • VulDB CNA Team coordinator

References

Problem Types

  • Path Traversal CWE