Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 29 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Elie
Elie mcp-project |
|
| Vendors & Products |
Elie
Elie mcp-project |
Tue, 28 Apr 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in elie mcp-project 0.1.0. The affected element is the function search_papers of the file research_server.py. The manipulation of the argument topic results in path traversal. Attacking locally is a requirement. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | elie mcp-project research_server.py search_papers path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-29T13:02:52.632Z
Reserved: 2026-04-28T13:12:35.060Z
Link: CVE-2026-7318
Updated: 2026-04-29T13:02:48.652Z
Status : Deferred
Published: 2026-04-28T22:16:51.890
Modified: 2026-04-29T21:16:21.590
Link: CVE-2026-7318
No data.
OpenCVE Enrichment
Updated: 2026-04-29T10:10:22Z