CVE-2026-7237: AgiFlow Path Traversal Puts Files at Risk
The National Vulnerability Database has identified CVE-2026-7237, a critical path traversal vulnerability affecting AgiFlow scaffold-mcp up to version 1.0.27. This flaw resides within the write-to-file functionality, specifically in the packages/scaffold-mcp/src/server/index.ts file. Attackers can exploit this by manipulating the file_path argument to traverse directories, potentially accessing or overwriting sensitive files remotely. The exploit is publicly available, amplifying the immediate risk.
With a CVSS score of 7.3 (HIGH), this vulnerability demands prompt attention. The National Vulnerability Database notes that the affected functionality and products are not precisely specified beyond the component, leaving a broad potential attack surface. Defenders must prioritize patching or upgrading AgiFlow scaffold-mcp to version 1.1.0, which addresses this issue via commit c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6.
What This Means For You
- If your organization utilizes AgiFlow scaffold-mcp, check your current version immediately. Upgrade to 1.1.0 or apply the relevant patch (c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6) to mitigate the risk of remote file system compromise via path traversal.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7237: AgiFlow Path Traversal via file_path parameter
title: CVE-2026-7237: AgiFlow Path Traversal via file_path parameter
id: scw-2026-04-28-ai-1
status: experimental
level: high
description: |
This rule detects attempts to exploit CVE-2026-7237 by looking for path traversal sequences ('../') within the 'file_path' query parameter in requests targeting the specific AgiFlow endpoint '/packages/scaffold-mcp/src/server/index.ts'. This indicates an attempt to access files outside the intended directory.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7237/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- 'file_path=../'
cs-uri|contains:
- '/packages/scaffold-mcp/src/server/index.ts'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7237 | Vulnerability | CVE-2026-7237 |
| CVE-2026-7237 | Affected Product | AgiFlow scaffold-mcp |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 28, 2026 at 11:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.