Plattform
nodejs
Komponente
@modelcontextprotocol/server-filesystem
Behoben in
0.6.5
0.6.3
CVE-2025-53110 is a high-severity vulnerability affecting versions of @modelcontextprotocol/server-filesystem up to 0.6.2. This vulnerability allows attackers to potentially access unintended files by exploiting a prefix matching flaw within the filesystem protocol. The issue has been resolved in version 0.6.4, and users are strongly advised to upgrade to this version to mitigate the risk. Cymulate reported the vulnerability.
The core of this vulnerability lies in how the Filesystem library handles directory prefixes. An attacker can craft a request that exploits this logic to navigate outside the permitted directory structure. This could lead to the exposure of sensitive configuration files, source code, or other data that should not be publicly accessible. The potential impact ranges from information disclosure to, in more complex scenarios, potential code execution if the exposed files contain executable code or scripts. While the immediate impact is primarily data exposure, the broader implications depend on the sensitivity of the files accessible through this path traversal.
This vulnerability was publicly disclosed on 2025-07-01. There is currently no indication of active exploitation campaigns targeting this specific vulnerability. The vulnerability is not listed on the CISA KEV catalog at the time of writing. Public proof-of-concept exploits are not widely available, but the nature of path traversal vulnerabilities makes it likely that such exploits will emerge.
Applications and services that rely on the @modelcontextprotocol/server-filesystem package for file access are at risk. This includes Node.js applications using this package as a dependency. Specifically, deployments with relaxed file permissions or those that handle user-supplied file paths without proper sanitization are particularly vulnerable.
• nodejs: Monitor for requests containing unusual prefixes in file access paths. Use console.log or a debugging tool to inspect the paths being accessed.
• nodejs: Examine the require statements in your application to ensure you are using a patched version of @modelcontextprotocol/server-filesystem (version 0.6.4 or later).
• generic web: Review access logs for unusual file access patterns, particularly those involving directory traversal attempts or unexpected file extensions.
disclosure
Exploit-Status
EPSS
0.07% (22% Perzentil)
CISA SSVC
The primary mitigation for CVE-2025-53110 is to immediately upgrade to version 0.6.4 or later of the @modelcontextprotocol/server-filesystem library. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing stricter input validation on directory prefixes to prevent malicious path manipulation. Web application firewalls (WAFs) can be configured with rules to detect and block requests containing suspicious path traversal patterns, such as sequences of '..' or absolute paths. Regularly review and audit file permissions to ensure that only authorized users and processes have access to sensitive files.
Actualice la biblioteca `modelcontextprotocol/servers` a la versión 0.6.4 o superior. Esto corregirá la vulnerabilidad de omisión de validación de ruta. Puede actualizar usando el gestor de paquetes que utilice, como `pip install modelcontextprotocol/servers==0.6.4`.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-53110 is a high-severity vulnerability in @modelcontextprotocol/server-filesystem versions up to 0.6.2. It allows attackers to access unintended files due to a prefix matching flaw.
You are affected if you are using @modelcontextprotocol/server-filesystem versions 0.6.2 or earlier. Upgrade to 0.6.4 or later to resolve the issue.
Upgrade to version 0.6.4 or later of the @modelcontextprotocol/server-filesystem package. Implement stricter input validation on file access requests as a temporary workaround.
There is currently no indication of active exploitation campaigns targeting this vulnerability, but a PoC could be developed easily.
Refer to the advisory published by the @modelcontextprotocol/server-filesystem project, which is likely available on their GitHub repository or website.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.