Cyber Posture

CVE-2026-7386

High

Published: 29 April 2026

Published
29 April 2026
Modified
29 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0007 20.6th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7386 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the Protocol-Specific Risks risk domain.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly prevents path traversal by validating and sanitizing the message_ids input in mail_mcp_server.py to block directory traversal sequences.

prevent

Remediates the specific vulnerability by identifying and applying the vendor patch (commit 638b162b26532e32fa8d8047f638537dbdfe197a) upgrading to version 1.3.4.

prevent

Enforces logical access controls on system resources to restrict unauthorized file access even if path traversal manipulation partially succeeds.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
Why these techniques?

Path traversal in public-facing mail-mcp-bridge server enables remote exploitation of the application (T1190) and unauthorized reading of local files (T1005).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A flaw has been found in fatbobman mail-mcp-bridge up to 1.3.3. Affected is an unknown function of the file src/mail_mcp_server.py. Executing a manipulation of the argument message_ids can lead to path traversal. The attack can be executed remotely. The exploit…

more

has been published and may be used. Upgrading to version 1.3.4 is able to address this issue. This patch is called 638b162b26532e32fa8d8047f638537dbdfe197a. Upgrading the affected component is recommended.

Deeper analysisAI

CVE-2026-7386 is a path traversal vulnerability (CWE-22) affecting fatbobman mail-mcp-bridge versions up to and including 1.3.3. The issue stems from an unidentified function in the file src/mail_mcp_server.py, where manipulation of the message_ids argument allows attackers to traverse paths outside intended directories.

The vulnerability is remotely exploitable over the network with low attack complexity, requiring no privileges, user interaction, or special scope changes (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L, base score 7.3). Remote attackers can leverage this to achieve limited impacts on confidentiality, integrity, and availability, such as reading or modifying unintended files.

Advisories recommend upgrading to version 1.3.4, which addresses the flaw via commit 638b162b26532e32fa8d8047f638537dbdfe197a. Relevant resources include the GitHub repository, patch commit, issue #2, and release tag for 1.3.4.

An exploit for this vulnerability has been published and may be used by attackers.

Details

CWE(s)

AI Security AnalysisAI

AI Category
AI Agent Protocols and Integrations
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: mcp

CVEs Like This One

CVE-2026-7810Shared CWE-22
CVE-2026-7319Shared CWE-22
CVE-2026-7149Shared CWE-22
CVE-2026-7315Shared CWE-22
CVE-2026-7205Shared CWE-22
CVE-2026-7594Shared CWE-22
CVE-2026-7212Shared CWE-22
CVE-2026-7272Shared CWE-22
CVE-2026-7400Shared CWE-22
CVE-2026-7811Shared CWE-22

References