Impact
A vulnerability in the document handling functions of Axle-Bucamp's MCP-Docusaurus allows an attacker to manipulate the DOCS_DIR/path argument, leading to a classic path traversal flaw. This flaw can be exploited from a remote connection and permits reading of arbitrary files on the server where the application runs, potentially exposing sensitive configuration files, access credentials, or other confidential data. The weakness is classified as CWE-22, a path traversal vulnerability that compromises confidentiality.
Affected Systems
The affected product is Axle-Bucamp MCP-Docusaurus. All releases up to and including the commit 404bc028e15ec304c9a045528560f4b5f27a17e0 are vulnerable. Because the project employs a rolling release model, specific version numbers for the fixed releases are not presently available; therefore, any currently deployed instance of the application is considered vulnerable until a fix is applied.
Risk and Exploitability
The CVSS score of 6.9 indicates a high impact potential. The EPSS score is not available, so a concrete estimate of exploitation frequency cannot be derived, but the exploit code has been published in the public domain, suggesting that it could be used by adversaries. The product is not listed in the CISA KEV catalog, and there is no official patch or workaround yet. An attacker would likely exploit the flaw by sending crafted HTTP requests to the vulnerable endpoints that accept the DOCS_DIR/path parameter. Given the remote nature of the attack, attackers could target the application without physical access to the host.
OpenCVE Enrichment