Loading
Generated remediation guidance and an executive summary. No account required.
A flaw has been found in elinsky execution-system-mcp 0.1.0. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal. The attack can be initiated remotely. The exploit has been published and may be used.
No affected products information available.
Use CWE-22 to widen CVE-2026-7319 into its surrounding weakness, vendor, and product context.