Path Traversal Vulnerability in WilliamCloudQi matlab-mcp-server
CVE-2026-7272
Key Information:
- Vendor
Williamcloudqi
- Status
- Vendor
- CVE Published:
- 28 April 2026
Badges
What is CVE-2026-7272?
A vulnerability exists in the WilliamCloudQi matlab-mcp-server, specifically within the generate_matlab_code and execute_matlab_code functions. This flaw allows an attacker to manipulate the scriptPath argument, potentially enabling unauthorized access to file paths outside of the intended directories. The vulnerability can be exploited remotely, demonstrating a significant security risk. The issue was reported to the project maintainers, but no response has been noted, which raises concerns regarding the patching of this critical weakness.
Affected Version(s)
matlab-mcp-server ab88f6b9bf5f36f725e8628029f7f6dd0d9913ca
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
