Cyber Posture

CVE-2026-7213

High

Published: 28 April 2026

Published
28 April 2026
Modified
29 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0006 18.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7213 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-9 (Information Input Restrictions).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires validation of untrusted inputs like filename/destination arguments to block path traversal sequences such as '../' in the save_file tool.

prevent

Enforces restrictions on filename inputs at application boundaries to prohibit traversal characters and patterns in fastmcp_server.py.

prevent

Limits application process privileges to authorized directories, reducing impact of successful path traversal outside intended save locations.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Remote unauthenticated path traversal in public-facing MLOps server save_file component directly enables exploitation of public-facing applications.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability was detected in ef10007 MLOps_MCP 1.0.0. This impacts an unknown function of the file fastmcp_server.py of the component save_file Tool. The manipulation of the argument filename/destination results in path traversal. The attack may be performed from remote. The…

more

exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Deeper analysisAI

CVE-2026-7213 is a path traversal vulnerability (CWE-22) in ef10007 MLOps_MCP version 1.0.0, published on 2026-04-28. It affects an unknown function in the file fastmcp_server.py within the save_file tool component, where manipulation of the filename/destination argument enables path traversal. The vulnerability carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), rated as high severity.

The vulnerability is exploitable remotely by unauthenticated attackers requiring low attack complexity and no user interaction. Successful exploitation allows limited impacts to confidentiality, integrity, and availability, potentially enabling unauthorized file access or modification outside intended directories.

Advisories from VulDB and the project's GitHub repository indicate the exploit is public and the issue was reported early via GitHub issue #1, but the project has not responded or issued patches. No specific mitigations are detailed in the references.

As an MLOps tool, the affected component has relevance to AI/ML workflows, though no real-world exploitation in the wild is documented.

Details

CWE(s)

CVEs Like This One

CVE-2025-59384Shared CWE-22
CVE-2025-15031Shared CWE-22
CVE-2026-24479Shared CWE-22
CVE-2025-66744Shared CWE-22
CVE-2026-6057Shared CWE-22
CVE-2026-5436Shared CWE-22
CVE-2026-2448Shared CWE-22
CVE-2025-61811Shared CWE-22
CVE-2025-2505Shared CWE-22
CVE-2025-69618Shared CWE-22

References