CVE-2026-7810: Python Notebook Path Traversal Exposes Servers

CVE-2026-7810: Python Notebook Path Traversal Exposes Servers

The National Vulnerability Database (NVD) has detailed CVE-2026-7810, a high-severity path traversal vulnerability (CVSS 7.3) in UsamaK98’s python-notebook-mcp up to commit a05a232815809a7e425b5fa7be26e0d4369894c2. The flaw resides within the create_notebook, read_notebook, edit_cell, and add_cell functions of the server.py file. This vulnerability allows for remote exploitation, and an exploit has already been published, making it an immediate threat.

The critical aspect here is the path traversal, a classic vulnerability that allows attackers to access, read, or write to arbitrary files and directories outside of the intended web root. For a server-side application like a notebook manager, this means an attacker could potentially read sensitive configuration files, modify application logic, or even achieve remote code execution by uploading malicious files to critical system paths. The NVD notes that the project utilizes a rolling release model, meaning no specific affected or patched versions are available, complicating patch management. Furthermore, the project has not yet responded to the issue report.

This is a critical blind spot for defenders. The lack of versioning combined with an unpatched, publicly exploited vulnerability means any deployment of this specific Python notebook project is at significant risk. Attackers thrive on these situations — low-hanging fruit with clear exploitation paths. CISOs need to assume compromise if this component is in their environment and act decisively.

What This Means For You

  • If your organization uses UsamaK98's `python-notebook-mcp`, you are exposed to CVE-2026-7810. This path traversal vulnerability is remotely exploitable, and an exploit is public. Immediately identify all instances of this specific Python notebook project. If found, isolate the systems and explore alternatives or implement stringent network segmentation and access controls to mitigate risk until a patch is available. A deployed exploit could lead to data exfiltration or full system compromise.

Related ATT&CK Techniques

🛡️ Detection Rules

4 rules · 6 SIEM formats

4 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high T1190 Initial Access

CVE-2026-7810: Python Notebook Path Traversal via create_notebook

Sigma YAML — free preview
title: CVE-2026-7810: Python Notebook Path Traversal via create_notebook
id: scw-2026-05-05-ai-1
status: experimental
level: high
description: |
  Detects attempts to exploit CVE-2026-7810 by targeting the create_notebook function in python-notebook-mcp. The rule looks for POST requests to '/create_notebook' with a URI query containing '../' which indicates a path traversal attempt.
author: SCW Feed Engine (AI-generated)
date: 2026-05-05
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-7810/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri|contains:
          - '/create_notebook'
      cs-uri-query|contains:
          - '../'
      cs-method|exact:
          - 'POST'
  condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-7810 Path Traversal UsamaK98 python-notebook-mcp up to a05a232815809a7e425b5fa7be26e0d4369894c2
CVE-2026-7810 Path Traversal Vulnerable functions: create_notebook, read_notebook, edit_cell, add_cell in server.py
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 05, 2026 at 07:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related coverage

CVE-2026-7823: Critical Command Injection in Totolink A8000RU Routers

CVE-2026-7823 — A security flaw has been discovered in Totolink A8000RU 7.1cu.643_b20200521. Affected is the function setAppFilterCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the...

vulnerabilityCVEcriticalhigh-severitycommand-injectioncwe-77cwe-78
/SCW Vulnerability Desk /CRITICAL /9.8 /⚑ 3 IOCs /⚙ 2 Sigma

CVE-2026-7822 — Itsourcecode Courier Management System SQL Injection

CVE-2026-7822 — A vulnerability was identified in itsourcecode Courier Management System 1.0. This impacts an unknown function of the file /print_pdets.php. The manipulation of the...

vulnerabilityCVEmedium-severitysql-injectioncwe-74cwe-89
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-7812: Remote Command Injection in 54yyyu code-mcp MCP Tool

CVE-2026-7812 — A vulnerability was found in 54yyyu code-mcp up to 4cfc4643541a110c906d93635b391bf7e357f4a8. The impacted element is the function git_operation of the file src/code_mcp/server.py of the...

vulnerabilityCVEhigh-severitycommand-injectioncwe-74cwe-77
/SCW Vulnerability Desk /HIGH /7.3 /⚑ 4 IOCs /⚙ 5 Sigma