CVE-2026-7213
Published: 28 April 2026
Summary
CVE-2026-7213 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-9 (Information Input Restrictions).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation of untrusted inputs like filename/destination arguments to block path traversal sequences such as '../' in the save_file tool.
Enforces restrictions on filename inputs at application boundaries to prohibit traversal characters and patterns in fastmcp_server.py.
Limits application process privileges to authorized directories, reducing impact of successful path traversal outside intended save locations.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote unauthenticated path traversal in public-facing MLOps server save_file component directly enables exploitation of public-facing applications.
NVD Description
A vulnerability was detected in ef10007 MLOps_MCP 1.0.0. This impacts an unknown function of the file fastmcp_server.py of the component save_file Tool. The manipulation of the argument filename/destination results in path traversal. The attack may be performed from remote. The…
more
exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
Deeper analysisAI
CVE-2026-7213 is a path traversal vulnerability (CWE-22) in ef10007 MLOps_MCP version 1.0.0, published on 2026-04-28. It affects an unknown function in the file fastmcp_server.py within the save_file tool component, where manipulation of the filename/destination argument enables path traversal. The vulnerability carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), rated as high severity.
The vulnerability is exploitable remotely by unauthenticated attackers requiring low attack complexity and no user interaction. Successful exploitation allows limited impacts to confidentiality, integrity, and availability, potentially enabling unauthorized file access or modification outside intended directories.
Advisories from VulDB and the project's GitHub repository indicate the exploit is public and the issue was reported early via GitHub issue #1, but the project has not responded or issued patches. No specific mitigations are detailed in the references.
As an MLOps tool, the affected component has relevance to AI/ML workflows, though no real-world exploitation in the wild is documented.
Details
- CWE(s)