CVE-2025-67366

Source
https://cve.org/CVERecord?id=CVE-2025-67366
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-67366.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-67366
Published
2026-01-07T17:16:01.893Z
Modified
2026-03-13T03:42:04.897417Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

@sylphxltd/filesystem-mcp v0.5.8 is an MCP server that provides file content reading functionality. Version 0.5.8 of filesystem-mcp contains a critical path traversal vulnerability in its "read_content" tool. This vulnerability arises from improper symlink handling in the path validation mechanism: the resolvePath function checks path validity before resolving symlinks, while fs.readFile resolves symlinks automatically during file access. This allows attackers to bypass directory restrictions by leveraging symlinks within the allowed directory that point to external files, enabling unauthorized access to files outside the intended operational scope.

References

Affected packages

Git / github.com/SylphxAI/filesystem-mcp

Affected ranges

Type
GIT
Repo
https://github.com/SylphxAI/filesystem-mcp
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.5.8"
        }
    ]
}

Affected versions

v0.*
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.5.5
v0.5.6
v0.5.7
v0.5.8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-67366.json"