CVE-2026-7588
ggerve coding-standards-mcp server.py get_best_practices path traversal
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in ggerve coding-standards-mcp. This issue affects the function get_style_guide/get_best_practices of the file server.py. The manipulation of the argument Language results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-22 |
| Vendor | ggerve |
| Product | coding-standards-mcp |
| Published | May 1, 2026 |
| Last Updated | May 1, 2026 |
Stay Ahead of the Next One
Get instant alerts for ggerve coding-standards-mcp
Be the first to know when new medium vulnerabilities affecting ggerve coding-standards-mcp are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
ggerve / coding-standards-mcp
5b097a3d6ff668d15c610911d20d2ce0d08cfc5a 94f619198724f79d1ea53992184eb4ba61418810 c21ab2754684329eab4feb72427dc9acfe61e52f
References
Credits
๐ LargeW (VulDB User) VulDB CNA Team