Path Traversal Vulnerability in Donchelo Processing-claude-mcp-bridge Tool
CVE-2026-7216

6.9MEDIUM

Key Information:

Vendor

Donchelo

Vendor
CVE Published:
28 April 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-7216?

A vulnerability in the Donchelo processing-claude-mcp-bridge has been identified, specifically in the create_sketch Tool's processing_server.py file. This flaw allows for path traversal due to improper handling of the sketch_name parameter. Exploiting this vulnerability could enable remote attackers to access restricted files on the system. The issue was disclosed to the project's management, but as of now, no response has been received regarding mitigation or patching. Given that this product follows a rolling release model, users should remain vigilant and apply any updates as they become available.

Affected Version(s)

processing-claude-mcp-bridge e017b20a4b592a45531a6392f494007f04e661bd

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

CPT_Penner (VulDB User)
VulDB CNA Team
.