CVE-2026-7159

medium

Description

A vulnerability was found in douinc mkdocs-mcp-plugin up to 0.4.1. This affects the function read_document/list_documents of the file server.py. Performing a manipulation of the argument docs_dir/file_path results in path traversal. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor confirms, that the "fix will be published within a few days."

References

https://vuldb.com/vuln/359758/cti

https://vuldb.com/vuln/359758

https://vuldb.com/submit/802063

https://github.com/douinc/mkdocs-mcp-plugin/issues/6#issuecomment-4223718119

https://github.com/douinc/mkdocs-mcp-plugin/issues/6

https://github.com/douinc/mkdocs-mcp-plugin/

Details

Source: Mitre, NVD

Published: 2026-04-27

Updated: 2026-04-27

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 7.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Severity: High

CVSS v4

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Severity: Medium