CVE-2026-7398: Path Traversal in BioinfoMCP Upload Endpoint
The National Vulnerability Database has disclosed CVE-2026-7398, a high-severity path traversal vulnerability impacting florensiawidjaja BioinfoMCP up to commit 7ada7918b9e515604d3c0ae264d3a9af10bf6e54. The weakness lies within the Upload function of the bioinfo_mcp_platform/app.py file, specifically in the Upload Endpoint component. Attackers can exploit this remotely by manipulating the Name argument during file uploads.
This vulnerability, with a CVSSv3.1 score of 7.3, allows for path traversal, potentially leading to information disclosure, unauthorized file modification, or even remote code execution if combined with other weaknesses. The National Vulnerability Database notes that exploit code is publicly available, increasing the immediate risk. The project utilizes continuous delivery, meaning specific affected or updated version details are unavailable.
Despite an early issue report, the project maintainers have not yet responded, leaving users exposed. Defenders should prioritize identifying instances of BioinfoMCP in their environments and preparing for immediate mitigation. This is a classic path traversal scenario, highlighting the critical importance of robust input validation, especially for file upload functionalities.
What This Means For You
- If your organization uses florensiawidjaja BioinfoMCP, you are at risk. This path traversal vulnerability is remotely exploitable and has public exploit code. Immediately identify all instances of BioinfoMCP within your infrastructure. Since no patch information is available, consider isolating affected systems or implementing strict network-level controls to prevent external access to the upload endpoint until a fix is released.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7398: BioinfoMCP Path Traversal via Upload Name Parameter
title: CVE-2026-7398: BioinfoMCP Path Traversal via Upload Name Parameter
id: scw-2026-04-29-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2026-7398 by identifying POST requests to the BioinfoMCP upload endpoint ('/bioinfo_mcp_platform/app.py') that contain the 'Name' parameter manipulated with path traversal sequences ('../'). This is the primary indicator of the vulnerability being exploited for initial access.
author: SCW Feed Engine (AI-generated)
date: 2026-04-29
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7398/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/bioinfo_mcp_platform/app.py'
cs-method|exact:
- 'POST'
cs-uri-query|contains:
- 'Name='
- '../'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7398 | Path Traversal | florensiawidjaja BioinfoMCP up to 7ada7918b9e515604d3c0ae264d3a9af10bf6e54 |
| CVE-2026-7398 | Path Traversal | Vulnerable function: Upload in bioinfo_mcp_platform/app.py |
| CVE-2026-7398 | Path Traversal | Vulnerable component: Upload Endpoint, argument 'Name' |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 29, 2026 at 22:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.