CVE-2026-7237: AgiFlow Path Traversal Puts Files at Risk

CVE-2026-7237: AgiFlow Path Traversal Puts Files at Risk

The National Vulnerability Database has identified CVE-2026-7237, a critical path traversal vulnerability affecting AgiFlow scaffold-mcp up to version 1.0.27. This flaw resides within the write-to-file functionality, specifically in the packages/scaffold-mcp/src/server/index.ts file. Attackers can exploit this by manipulating the file_path argument to traverse directories, potentially accessing or overwriting sensitive files remotely. The exploit is publicly available, amplifying the immediate risk.

With a CVSS score of 7.3 (HIGH), this vulnerability demands prompt attention. The National Vulnerability Database notes that the affected functionality and products are not precisely specified beyond the component, leaving a broad potential attack surface. Defenders must prioritize patching or upgrading AgiFlow scaffold-mcp to version 1.1.0, which addresses this issue via commit c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6.

What This Means For You

  • If your organization utilizes AgiFlow scaffold-mcp, check your current version immediately. Upgrade to 1.1.0 or apply the relevant patch (c4d23592ae5fb59cfeefc4641e6826f8ac89b9c6) to mitigate the risk of remote file system compromise via path traversal.

Related ATT&CK Techniques

🛡️ Detection Rules

3 rules · 6 SIEM formats

3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-7237: AgiFlow Path Traversal via file_path parameter

Sigma YAML — free preview
title: CVE-2026-7237: AgiFlow Path Traversal via file_path parameter
id: scw-2026-04-28-ai-1
status: experimental
level: high
description: |
  This rule detects attempts to exploit CVE-2026-7237 by looking for path traversal sequences ('../') within the 'file_path' query parameter in requests targeting the specific AgiFlow endpoint '/packages/scaffold-mcp/src/server/index.ts'. This indicates an attempt to access files outside the intended directory.
author: SCW Feed Engine (AI-generated)
date: 2026-04-28
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7237/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri-query|contains:
          - 'file_path=../'
      cs-uri|contains:
          - '/packages/scaffold-mcp/src/server/index.ts'
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7237 Vulnerability CVE-2026-7237
CVE-2026-7237 Affected Product AgiFlow scaffold-mcp
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 28, 2026 at 11:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7280 — Code Execution

CVE-2026-7280 — AVACAST developed by eMPIA Technology has a Unquoted Service Path vulnerability, allowing privileged local attackers to place a malicious executable file in a...

vulnerabilityCVEmedium-severitycode-executioncwe-428
/SCW Vulnerability Desk /MEDIUM /6.7 /⚑ 2 IOCs /⚙ 3 Sigma

AVACAST DLL Hijacking (CVE-2026-7279) Allows System Code Execution

CVE-2026-7279 — AVACAST developed by eMPIA Technology, has a DLL Hijacking vulnerability, allowing authenticated local attackers to place a malicious DLL in a specific directory,...

vulnerabilityCVEhigh-severitycode-executioncwe-427
/SCW Vulnerability Desk /HIGH /7.8 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-7264 — SQL Injection

CVE-2026-7264 — A weakness has been identified in SourceCodester Pizzafy Ecommerce System 1.0. Impacted is the function get_cart_items of the file /admin/ajax.php?action=get_cart_items. Executing a manipulation...

vulnerabilityCVEmedium-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 3 Sigma