VBS-2026-0013HIGHCVSS 8.5CWE-22

Git MCP server chain: path traversal + argument injection + repo restriction bypass

Multiple git MCP server vulnerabilities (CVE-2025-68143/68144/68145) can be chained to tamper with files or cross repository boundaries when tool policy is weak.

Published
2025-12-18
Discovered By
Public advisories
CVSS Score
8.5 / 10
Affected AI Platforms
ClaudeCodexCursorAny MCP-enabled agent
Affected Tech Stack
MCP git serversTool argument parsingPath validation
Remediation

Upgrade affected MCP server versions, validate canonical repository boundaries, and run MCP servers with least-privilege filesystem and network scopes.

#mcp#path-traversal#argument-injection#toolchain-risk#cve
Check if your app is vulnerable to VBS-2026-0013

PolyDefender detects this and dozens of other AI-specific vulnerability patterns.

FAQ
Q

How do I check if my MCP git servers + Tool argument parsing app is affected by git MCP server chain: path traversal + argument injection + repo restriction bypass?

A

Multiple git MCP server vulnerabilities (CVE-2025-68143/68144/68145) can be chained to tamper with files or cross repository boundaries when tool policy is weak.. Search your codebase for MCP git servers, Tool argument parsing, Path validation patterns and verify the remediation has been applied.

Q

Why does Claude and Codex generate code with CWE-22 (high severity)?

A

Multiple git MCP server vulnerabilities (CVE-2025-68143/68144/68145) can be chained to tamper with files or cross repository boundaries when tool policy is weak.

Q

How do I fix git MCP server chain: path traversal + argument injection + repo restriction bypass?

A

Upgrade affected MCP server versions, validate canonical repository boundaries, and run MCP servers with least-privilege filesystem and network scopes.

Q

What can an attacker do if my app contains VBS-2026-0013?

A

With CVSS 8.5 (high), this vulnerability is high risk — significant data or functionality can be compromised.