Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). In mcp-server-git versions prior to 2026.1.14, the git_add tool did not validate that file paths provided in the files argument were within the repository boundaries. Because the tool used GitPython's repo.index.add() rather than the Git CLI, relative paths containing `../` sequences that resolve outside the repository were accepted and staged into the Git index. Users are advised to upgrade to 2026.1.14 or newer to remediate this issue.
Metrics
Affected Vendors & Products
References
History
Sat, 28 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Modelcontextprotocol
Modelcontextprotocol servers |
|
| Vendors & Products |
Modelcontextprotocol
Modelcontextprotocol servers |
Thu, 26 Feb 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Model Context Protocol Servers is a collection of reference implementations for the model context protocol (MCP). In mcp-server-git versions prior to 2026.1.14, the git_add tool did not validate that file paths provided in the files argument were within the repository boundaries. Because the tool used GitPython's repo.index.add() rather than the Git CLI, relative paths containing `../` sequences that resolve outside the repository were accepted and staged into the Git index. Users are advised to upgrade to 2026.1.14 or newer to remediate this issue. | |
| Title | mcp-server-git : Path traversal in git_add allows staging files outside repository boundaries | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-02-25T23:45:52.077Z
Updated: 2026-02-26T17:04:59.103Z
Reserved: 2026-02-23T18:37:14.790Z
Link: CVE-2026-27735
Updated: 2026-02-26T17:04:49.724Z
Status : Awaiting Analysis
Published: 2026-02-26T00:16:25.017
Modified: 2026-02-27T14:06:59.787
Link: CVE-2026-27735
No data.