CVE-2026-7212
Published: 28 April 2026
Summary
CVE-2026-7212 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the Protocol-Specific Risks risk domain.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of the root_dir/path argument in notes_mcp.py to block path traversal sequences like ../.
Mandates identification, reporting, and timely patching of the path traversal flaw in edvardlindelof notes-mcp up to 0.1.4.
Limits impact of successful path traversal by restricting the application's privileges to only necessary file system access.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in a remotely accessible application directly enables T1190 (exploiting public-facing apps without auth) and facilitates T1005 (unauthorized access to files on the local system outside intended directories).
NVD Description
A security vulnerability has been detected in edvardlindelof notes-mcp up to 0.1.4. This affects an unknown function of the file notes_mcp.py. The manipulation of the argument root_dir/path leads to path traversal. The attack is possible to be carried out remotely.…
more
The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Deeper analysisAI
CVE-2026-7212 is a path traversal vulnerability (CWE-22) affecting edvardlindelof notes-mcp versions up to 0.1.4. The flaw exists in an unknown function within the notes_mcp.py file, where manipulation of the root_dir/path argument enables path traversal attacks.
Remote attackers can exploit this vulnerability over the network without requiring privileges or user interaction, as reflected in its CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L). Successful exploitation allows limited impacts on confidentiality, integrity, and availability, such as accessing or modifying files outside the intended directory.
The project was informed of the issue early via GitHub issue #2 but has not responded. No patches or official mitigations are mentioned in available advisories. The exploit has been publicly disclosed and may be used, with details referenced in the GitHub repository at https://github.com/edvardlindelof/notes-mcp/ and VulDB entries including https://vuldb.com/vuln/359808.
Details
- CWE(s)
AI Security AnalysisAI
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Protocol-Specific Risks
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: mcp