CVE-2026-7149: Dexhunter Kaggle-MCP Path Traversal Vulnerability Disclosed
The National Vulnerability Database has disclosed CVE-2026-7149, a high-severity path traversal vulnerability impacting dexhunter kaggle-mcp up to version 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d. This flaw, rated with a CVSS score of 7.3, allows remote attackers to manipulate the competition_id argument within the prepare_kaggle_dataset function in src/kaggle_mcp/server.py.
This vulnerability is particularly dangerous because it is remotely exploitable and its exploit code has been publicly disclosed. Attackers can leverage this path traversal to access or create files outside of intended directories, potentially leading to information disclosure, arbitrary file writes, or even remote code execution depending on the server’s configuration and permissions. The project maintains a rolling release strategy, meaning specific affected versions are not precisely defined, making it harder for defenders to track.
Despite early notification via an issue report, the project has not yet responded. This lack of communication leaves users exposed to a known, actively exploitable vulnerability. Defenders should assume active exploitation given the public disclosure and the ease of attack.
What This Means For You
- If your organization utilizes dexhunter kaggle-mcp, you are directly exposed to CVE-2026-7149. The public exploit disclosure means this isn't theoretical; attackers are already probing for this. Immediately assess your deployments for this software. If found, isolate affected systems and prepare for potential data exfiltration or unauthorized file modification. Without a patch, the risk remains critical.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7149: Dexhunter Kaggle-MCP Path Traversal Attempt
title: CVE-2026-7149: Dexhunter Kaggle-MCP Path Traversal Attempt
id: scw-2026-04-27-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit the CVE-2026-7149 vulnerability in dexhunter kaggle-mcp. The rule specifically looks for requests to the '/prepare_kaggle_dataset' endpoint with a 'competition_id' parameter containing directory traversal sequences ('../'). This indicates an attempt to access files outside of the intended directory.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7149/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/prepare_kaggle_dataset?competition_id='
cs-uri|contains:
- '../'
condition: cs-uri
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7149 | Path Traversal | dexhunter kaggle-mcp up to 406127ffcb2b91b8c10e20e6c2ca787fbc1dc92d |
| CVE-2026-7149 | Path Traversal | Vulnerable function: prepare_kaggle_dataset in src/kaggle_mcp/server.py |
| CVE-2026-7149 | Path Traversal | Manipulation of argument: competition_id |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 27, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.