CVE-2026-7788
Axle-Bucamp MCP-Docusaurus document.py get_content path traversal
A security flaw has been discovered in Axle-Bucamp MCP-Docusaurus up to 404bc028e15ec304c9a045528560f4b5f27a17e0. The affected element is the function update_document/continue_document/delete_document/get_content of the file app/routes/document.py. Performing a manipulation of the argument DOCS_DIR/path results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.
| CWE | CWE-22 |
| Vendor | axle-bucamp |
| Product | mcp-docusaurus |
| Published | May 5, 2026 |
Get instant alerts for axle-bucamp mcp-docusaurus
Be the first to know when new high vulnerabilities affecting axle-bucamp mcp-docusaurus are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R