All versions of the package mcp-markdownify-server are vulnerable to Files or Directories Accessible to External Parties via the get-markdown-file tool. An attacker can craft a prompt that, once accessed by the MCP host, will allow it to read arbitrary files from the host running the server.
History

Thu, 29 May 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 May 2025 05:15:00 +0000

Type Values Removed Values Added
Description All versions of the package mcp-markdownify-server are vulnerable to Files or Directories Accessible to External Parties via the get-markdown-file tool. An attacker can craft a prompt that, once accessed by the MCP host, will allow it to read arbitrary files from the host running the server.
Weaknesses CWE-552
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:P'}

cvssV4_0

{'score': 8.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: snyk

Published: 2025-05-29T05:00:01.272Z

Updated: 2025-05-29T13:16:22.499Z

Reserved: 2025-05-27T13:22:21.098Z

Link: CVE-2025-5273

cve-icon Vulnrichment

Updated: 2025-05-29T13:16:14.020Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-29T05:15:21.400

Modified: 2025-05-29T14:29:50.247

Link: CVE-2025-5273

cve-icon Redhat

No data.