CVE-2026-7386
Published: 29 April 2026
Summary
CVE-2026-7386 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 7.3 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the Protocol-Specific Risks risk domain.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents path traversal by validating and sanitizing the message_ids input in mail_mcp_server.py to block directory traversal sequences.
Remediates the specific vulnerability by identifying and applying the vendor patch (commit 638b162b26532e32fa8d8047f638537dbdfe197a) upgrading to version 1.3.4.
Enforces logical access controls on system resources to restrict unauthorized file access even if path traversal manipulation partially succeeds.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing mail-mcp-bridge server enables remote exploitation of the application (T1190) and unauthorized reading of local files (T1005).
NVD Description
A flaw has been found in fatbobman mail-mcp-bridge up to 1.3.3. Affected is an unknown function of the file src/mail_mcp_server.py. Executing a manipulation of the argument message_ids can lead to path traversal. The attack can be executed remotely. The exploit…
more
has been published and may be used. Upgrading to version 1.3.4 is able to address this issue. This patch is called 638b162b26532e32fa8d8047f638537dbdfe197a. Upgrading the affected component is recommended.
Deeper analysisAI
CVE-2026-7386 is a path traversal vulnerability (CWE-22) affecting fatbobman mail-mcp-bridge versions up to and including 1.3.3. The issue stems from an unidentified function in the file src/mail_mcp_server.py, where manipulation of the message_ids argument allows attackers to traverse paths outside intended directories.
The vulnerability is remotely exploitable over the network with low attack complexity, requiring no privileges, user interaction, or special scope changes (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, base score 7.3). Remote attackers can leverage this to achieve limited impacts on confidentiality, integrity, and availability, such as reading or modifying unintended files.
Advisories recommend upgrading to version 1.3.4, which addresses the flaw via commit 638b162b26532e32fa8d8047f638537dbdfe197a. Relevant resources include the GitHub repository, patch commit, issue #2, and release tag for 1.3.4.
An exploit for this vulnerability has been published and may be used by attackers.
Details
- CWE(s)
AI Security AnalysisAI
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Protocol-Specific Risks
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: mcp