CVE-2026-7272: WilliamCloudQi matlab-mcp-server Path Traversal Vulnerability
The National Vulnerability Database has disclosed CVE-2026-7272, a high-severity path traversal vulnerability (CVSS 7.3) affecting WilliamCloudQi’s matlab-mcp-server, specifically versions up to commit ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca. The flaw resides within the generate_matlab_code/execute_matlab_code functions in src/index.ts, part of the MCP Interface component.
Attackers can remotely exploit this by manipulating the scriptPath argument, potentially gaining unauthorized access to arbitrary files or directories outside the intended scope. This isn’t theoretical; an exploit has been publicly released, meaning the window for proactive defense is rapidly closing.
While the project maintainers were reportedly informed early via an issue report, the National Vulnerability Database indicates no response has been received. This lack of communication or patch means any organization utilizing this server is exposed. Defenders need to recognize the immediate threat from published exploits and the inherent risk of unpatched software.
What This Means For You
- If your organization uses WilliamCloudQi matlab-mcp-server, you are directly exposed to a high-severity, remotely exploitable path traversal vulnerability (CVE-2026-7272) with a public exploit. Immediately assess your environment for this specific component. Without a patch, the only viable mitigation is to restrict network access or disable the affected functionality until a fix is available. Attackers are already leveraging public exploits, so assume active targeting.
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7272 | Path Traversal | WilliamCloudQi matlab-mcp-server up to ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca |
| CVE-2026-7272 | Path Traversal | Vulnerable function: generate_matlab_code/execute_matlab_code in src/index.ts |
| CVE-2026-7272 | Path Traversal | Vulnerable component: MCP Interface |
| CVE-2026-7272 | Path Traversal | Manipulation of argument: scriptPath |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 28, 2026 at 17:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.