Impact
The vulnerability occurs in the read_document and list_documents functions of server.py in mkdocs-mcp-plugin. By manipulating the docs_dir or file_path parameters, an attacker can perform path traversal. The flaw is exploitable remotely, allowing the attacker to read files outside the intended directory and potentially disclose sensitive data, thereby compromising confidentiality.
Affected Systems
The issue affects douinc mkdocs-mcp-plugin versions up to and including 0.4.1. Any installation that has not applied the forthcoming fix is susceptible.
Risk and Exploitability
The CVSS score of 6.9 indicates a moderate severity. No EPSS data is available, but the vulnerability has already been exposed publicly, meaning that exploitation is feasible. It is not listed in CISA KEV. Attackers can trigger the flaw from the network by sending crafted requests to the plugin’s API, potentially bypassing normal file boundaries.
OpenCVE Enrichment
Github GHSA