Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 29 Apr 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw has been found in fatbobman mail-mcp-bridge up to 1.3.3. Affected is an unknown function of the file src/mail_mcp_server.py. Executing a manipulation of the argument message_ids can lead to path traversal. The attack can be executed remotely. The exploit has been published and may be used. Upgrading to version 1.3.4 is able to address this issue. This patch is called 638b162b26532e32fa8d8047f638537dbdfe197a. Upgrading the affected component is recommended. | |
| Title | fatbobman mail-mcp-bridge mail_mcp_server.py path traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-29T15:32:11.201Z
Reserved: 2026-04-29T08:47:29.276Z
Link: CVE-2026-7386
Updated: 2026-04-29T15:32:03.351Z
Status : Received
Published: 2026-04-29T16:16:29.333
Modified: 2026-04-29T16:16:29.333
Link: CVE-2026-7386
No data.
OpenCVE Enrichment
No data.