Description
A vulnerability was identified in ryanjoachim mcp-rtfm 0.1.0. This vulnerability affects the function get_doc_content/read_doc/update_doc of the component MCP Interface. Such manipulation of the argument docFile leads to path traversal. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e6f0686fc36012f78236e7fed172c81444904b0b. It is best practice to apply a patch to resolve this issue.
Published: 2026-05-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the MCP Interface component of ryanjoachim's mcp-rtfm v0.1.0. In the get_doc_content, read_doc, and update_doc functions, an attacker can supply a crafted docFile argument that causes a path traversal, allowing traversal outside the intended document directory. This remote exploitation can lead to unauthorized access to system files or data, constituting a significant confidentiality breach.

Affected Systems

The affected product is the open‑source MCP Interface known as mcp-rtfm, maintained by ryanjoachim, specifically versions starting at 0.1.0. The path traversal flaw impacts the functions that handle document content operations, and the vulnerability is present in all releases that have not applied the documented patch.

Risk and Exploitability

With a CVSS score of 5.3, the flaw represents moderate severity, and while the EPSS score is not available, publicly documented exploits suggest it can be abused. Because the attack vector is remote and the weakness is a classic path traversal (CWE‑22), authenticated or unauthenticated users with network access to the MCP Interface can potentially read arbitrary files. The vulnerability is not listed in the CISA KEV catalog, but the availability of a public exploit increases the likelihood of real‑world attacks.

Generated by OpenCVE AI on May 4, 2026 at 05:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the patch commit e6f0686fc36012f78236e7fed172c81444904b0b or upgrade to a version that incorporates the fix.
  • Validate and sanitize the docFile input in the MCP Interface to reject or normalize path traversal characters and restrict access to the intended directory.
  • Restrict network exposure of the MCP Interface, ensuring only trusted users or services can access the update_doc API endpoints.

Generated by OpenCVE AI on May 4, 2026 at 05:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Ryanjoachim
Ryanjoachim mcp-rtfm
Vendors & Products Ryanjoachim
Ryanjoachim mcp-rtfm

Mon, 04 May 2026 04:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in ryanjoachim mcp-rtfm 0.1.0. This vulnerability affects the function get_doc_content/read_doc/update_doc of the component MCP Interface. Such manipulation of the argument docFile leads to path traversal. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e6f0686fc36012f78236e7fed172c81444904b0b. It is best practice to apply a patch to resolve this issue.
Title ryanjoachim mcp-rtfm MCP update_doc path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Ryanjoachim Mcp-rtfm
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-04T17:50:05.370Z

Reserved: 2026-05-03T16:01:32.322Z

Link: CVE-2026-7728

cve-icon Vulnrichment

Updated: 2026-05-04T16:37:43.907Z

cve-icon NVD

Status : Deferred

Published: 2026-05-04T05:16:00.977

Modified: 2026-05-04T15:18:40.077

Link: CVE-2026-7728

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T16:06:09Z

Weaknesses