Listen to this Post
The vulnerability in @modelcontextprotocol/server-filesystem (CVE-2025-XXXXX) arises due to insufficient path validation when handling symbolic links (symlinks) and prefix matching. Attackers can exploit this by crafting symlinks that point outside permitted directories, bypassing security checks. The system only verifies if the resolved path starts with an allowed prefix, but fails to properly resolve symlinks before validation. This allows unauthorized access to sensitive files outside the intended directory scope.
DailyCVE Form:
Platform: @modelcontextprotocol/server-filesystem
Version: <= 0.6.2, >= 2025.1.14 < 2025.7.1
Vulnerability: Path bypass
Severity: High
Date: Jul 1, 2025
Prediction: Patch expected by Jul 8, 2025
What Undercode Say:
Check symlink resolution ls -l /path/to/symlink readlink -f /path/to/symlink Verify patch npm list @modelcontextprotocol/server-filesystem
How Exploit:
1. Create symlink pointing outside allowed dir.
- Trick server into accessing it via prefix match.
Protection from this CVE:
- Update to v2025.7.1.
- Disable symlink following.
Impact:
Unauthorized file access.
Sources:
Reported By: github.com
Extra Source Hub:
Undercode