A vulnerability has been found in elinsky execution-system-mcp 0.1.0 and classified as critical. The impacted element is the function _get_context_file_path of the file src/execution_system_mcp/server.py of the component add_action Tool. This manipulation of the argument context causes path traversal.

This vulnerability is handled as CVE-2026-7319. The attack can be initiated remotely. Additionally, an exploit exists.