CVE-2026-7384 — Ezequiroga Mcp-Bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea3 Path Traversal

CVE-2026-7384 — Ezequiroga Mcp-Bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea3 Path Traversal

CVE-2026-7384 — A vulnerability was detected in ezequiroga mcp-bases 357ca19c7a49a9b9cb2ef639b366f03aba8bea39/c630b8ab0f970614d42da8e566e9c0d15a16414c. This impacts the function search_papers of the file research_server.py. Performing a manipulation of the argument topic results in path traversal. R

What This Means For You

  • If your environment is affected by CWE-22, patch immediately and audit logs for signs of exploitation. Monitor vendor advisories for CVE-2026-7384 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

6 rules · 6 SIEM formats

6 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

medium T1071.001 Command and Control

C2 Beacon Detection — HTTP to Suspicious Domain

Sigma YAML — free preview
title: C2 Beacon Detection — HTTP to Suspicious Domain
id: scw-2026-04-29-1
status: experimental
level: medium
description: |
  Detects high-frequency HTTP POST beaconing to target.local, which may indicate compromised endpoints calling back after the CVE-2026-7384 breach.
author: SCW Feed Engine (auto-generated)
date: 2026-04-29
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7384/
tags:
  - attack.command_and_control
  - attack.t1071.001
logsource:
    category: proxy
detection:
  selection:
      dst_domain|endswith:
        - 'target.local'
      cs-method: 'POST'
      condition: selection | count() by src_ip > 50
falsepositives:
  - Legitimate activity from CVE-2026-7384

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7384 Path Traversal ezequiroga mcp-bases (commit 357ca19c7a49a9b9cb2ef639b366f03aba8bea39/c630b8ab0f970614d42da8e566e9c0d15a16414c)
CVE-2026-7384 Path Traversal research_server.py::search_papers function
CVE-2026-7384 Path Traversal Manipulation of argument 'topic'
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 29, 2026 at 18:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-5161: Pardus About Suffers High-Severity Symlink Vulnerability

CVE-2026-5161 — Improper link resolution before file access ('link following') vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus About allows Symlink Attack. This issue...

vulnerabilityCVEhigh-severitycwe-59
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 1 IOC /⚙ 2 Sigma

CVE-2026-5141: Pardus Software Center Vulnerability Allows Privileged Process Hijacking

CVE-2026-5141 — Improper Privilege Management, Improper Access Control, Incorrect privilege assignment vulnerability in TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center allows Hijacking a...

vulnerabilityCVEhigh-severityimproper-access-controlcwe-266cwe-269cwe-284
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 1 IOC /⚙ 2 Sigma

Acronis DLP and Cyber Protect Agent Vulnerable to Privilege Escalation (CVE-2026-41952)

CVE-2026-41952 — Local privilege escalation due to improper input validation. The following products are affected: Acronis DeviceLock DLP (Windows) before build 9.0.93212, Acronis Cyber Protect...

vulnerabilityCVEhigh-severityprivilege-escalationcwe-123
/SCW Vulnerability Desk /HIGH /7.8 /⚑ 1 IOC /⚙ 3 Sigma