CVE-2025-53110
JavaScript vulnerability analysis and mitigation

Overview

A path validation vulnerability (CVE-2025-53110) was discovered in @modelcontextprotocol/server-filesystem affecting versions <=0.6.2 and >=2025.1.14, <2025.7.1. The vulnerability was disclosed on July 1, 2025, and allows attackers to bypass path validation mechanisms when the prefix matches an allowed directory (GitHub Advisory).

Technical details

The vulnerability exists in the filesystem component where path validation can be bypassed in cases where the prefix matches an allowed directory. The issue has been assigned a CVSS v4.0 score of 7.3 (High) with the following vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:H/SI:H/SA:H. The vulnerability requires network access with low attack complexity and no privileges required, though passive user interaction is needed (GitHub Advisory).

Impact

The vulnerability has significant impact potential, particularly on system availability and subsequent system effects. While the direct confidentiality and integrity impacts are rated as None, the subsequent system impacts for confidentiality, integrity, and availability are all rated as High according to the CVSS metrics (GitHub Advisory).

Mitigation and workarounds

Users are advised to upgrade to version 2025.7.1 or version 0.6.3 which contain patches for this vulnerability. The fix was implemented through a security patch merged into the main branch (GitHub Commit).

Community reactions

The vulnerability was responsibly disclosed by security researcher Elad Beber from Cymulate. The vendor responded by quickly releasing patches in both the 0.6.x and 2025.x version lines (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management