Description
A security flaw has been discovered in Axle-Bucamp MCP-Docusaurus up to 404bc028e15ec304c9a045528560f4b5f27a17e0. The affected element is the function update_document/continue_document/delete_document/get_content of the file app/routes/document.py. Performing a manipulation of the argument DOCS_DIR/path results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.
Published: 2026-05-05
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A vulnerability in the document handling functions of Axle-Bucamp's MCP-Docusaurus allows an attacker to manipulate the DOCS_DIR/path argument, leading to a classic path traversal flaw. This flaw can be exploited from a remote connection and permits reading of arbitrary files on the server where the application runs, potentially exposing sensitive configuration files, access credentials, or other confidential data. The weakness is classified as CWE-22, a path traversal vulnerability that compromises confidentiality.

Affected Systems

The affected product is Axle-Bucamp MCP-Docusaurus. All releases up to and including the commit 404bc028e15ec304c9a045528560f4b5f27a17e0 are vulnerable. Because the project employs a rolling release model, specific version numbers for the fixed releases are not presently available; therefore, any currently deployed instance of the application is considered vulnerable until a fix is applied.

Risk and Exploitability

The CVSS score of 6.9 indicates a high impact potential. The EPSS score is not available, so a concrete estimate of exploitation frequency cannot be derived, but the exploit code has been published in the public domain, suggesting that it could be used by adversaries. The product is not listed in the CISA KEV catalog, and there is no official patch or workaround yet. An attacker would likely exploit the flaw by sending crafted HTTP requests to the vulnerable endpoints that accept the DOCS_DIR/path parameter. Given the remote nature of the attack, attackers could target the application without physical access to the host.

Generated by OpenCVE AI on May 5, 2026 at 01:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the MCP-Docusaurus repository to the latest commit that contains the security fix or apply a vendor-provided patch once released.
  • Configure the web server or application to reject any requests that attempt directory traversal, such as by validating the DOCS_DIR/path parameter against a whitelist of allowed directories.
  • Restrict network exposure of the document handling endpoints, enable authentication, and monitor logs for anomalous path traversal attempts.
  • Implement file system access controls to limit the application process to the intended document directory.

Generated by OpenCVE AI on May 5, 2026 at 01:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 00:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in Axle-Bucamp MCP-Docusaurus up to 404bc028e15ec304c9a045528560f4b5f27a17e0. The affected element is the function update_document/continue_document/delete_document/get_content of the file app/routes/document.py. Performing a manipulation of the argument DOCS_DIR/path results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.
Title Axle-Bucamp MCP-Docusaurus document.py get_content path traversal
Weaknesses CWE-22
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-05T00:00:17.615Z

Reserved: 2026-05-04T16:47:35.469Z

Link: CVE-2026-7788

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T00:16:18.003

Modified: 2026-05-05T00:16:18.003

Link: CVE-2026-7788

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T01:30:12Z

Weaknesses