๐Ÿ” CVE Alert

CVE-2026-7588

MEDIUM 5.3

ggerve coding-standards-mcp server.py get_best_practices path traversal

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in ggerve coding-standards-mcp. This issue affects the function get_style_guide/get_best_practices of the file server.py. The manipulation of the argument Language results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.

CWE CWE-22
Vendor ggerve
Product coding-standards-mcp
Published May 1, 2026
Last Updated May 1, 2026
Stay Ahead of the Next One

Get instant alerts for ggerve coding-standards-mcp

Be the first to know when new medium vulnerabilities affecting ggerve coding-standards-mcp are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

ggerve / coding-standards-mcp
5b097a3d6ff668d15c610911d20d2ce0d08cfc5a 94f619198724f79d1ea53992184eb4ba61418810 c21ab2754684329eab4feb72427dc9acfe61e52f

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/360541 vuldb.com: https://vuldb.com/vuln/360541/cti vuldb.com: https://vuldb.com/submit/804390 github.com: https://github.com/ggerve/coding-standards-mcp/issues/3 github.com: https://github.com/ggerve/coding-standards-mcp/

Credits

๐Ÿ” LargeW (VulDB User) VulDB CNA Team