Path Traversal Vulnerability in Flux159 MCP Game Asset Generator
CVE-2026-7594
Key Information:
- Vendor
Flux159
- Status
- Vendor
- CVE Published:
- 1 May 2026
Badges
What is CVE-2026-7594?
A path traversal vulnerability exists in the image_to_3d_async function within the MCP Interface of Flux159's mcp-game-asset-gen version 0.1.0. This issue arises from improper handling of the statusFile argument, allowing attackers to manipulate file paths. Without adequate input validation, this vulnerability can be exploited remotely, potentially compromising the host system. The developers had been notified through an issue report but have not responded to address the flaw, thus increasing the urgency for users to secure their installations.
Affected Version(s)
mcp-game-asset-gen 0.1.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
