Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. excel-mcp-server
  4. ›
  5. CVE-2026-40576

CVE-2026-40576: excel-mcp-server has a Path Traversal issue

April 14, 2026 (updated April 24, 2026)

A path traversal vulnerability exists in excel-mcp-server versions up to and including 0.1.7. When running in SSE or Streamable-HTTP transport mode (the documented way to use this server remotely), an unauthenticated attacker on the network can read, write, and overwrite arbitrary files on the host filesystem by supplying crafted filepath arguments to any of the 25 exposed MCP tool handlers.

The server is intended to confine file operations to a directory set by the EXCEL_FILES_PATH environment variable. The function responsible for enforcing this boundary — get_excel_path() — fails to do so due to two independent flaws: it passes absolute paths through without any check, and it joins relative paths without resolving or validating the result. Combined with zero authentication on the default network-facing transport and a default bind address of 0.0.0.0 (all interfaces), this allows trivial remote exploitation.


References

  • github.com/advisories/GHSA-j98m-w3xp-9f56
  • github.com/haris-musa/excel-mcp-server
  • github.com/haris-musa/excel-mcp-server/commit/f51340ecd5778952405044b203d3a2d4c8a46833
  • github.com/haris-musa/excel-mcp-server/security/advisories/GHSA-j98m-w3xp-9f56
  • nvd.nist.gov/vuln/detail/CVE-2026-40576

Code Behaviors & Features

Detect and mitigate CVE-2026-40576 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.1.8

Fixed versions

  • 0.1.8

Solution

Upgrade to version 0.1.8 or above.

Impact 9.4 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

pypi/excel-mcp-server/CVE-2026-40576.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:20:11 +0000.