Impact
A path traversal vulnerability exists in the open_document handler of doc-tools-mcp 1.0.18 that allows an attacker to supply a crafted file path and read files outside of the intended directory. This can expose confidential data such as configuration files or logs. The flaw uses a standard traversal technique covered by CWE‑22.
Affected Systems
The product affected is puchunjie:doc-tools-mcp; the vulnerable version is 1.0.18. No other versions are listed, so the known risk begins with that release.
Risk and Exploitability
The CVSS score of 5.3 points to medium severity. No EPSS data is available and the vulnerability is not in the KEV catalog yet, but public code to exploit the flaw has already appeared. The attack can be launched remotely through the exposed MCP service. While the impact is primarily confidentiality, any access to sensitive files could also lead to further compromises.
OpenCVE Enrichment