Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 06 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Axle-bucamp
Axle-bucamp mcp-docusaurus |
|
| Vendors & Products |
Axle-bucamp
Axle-bucamp mcp-docusaurus |
Tue, 05 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 05 May 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in Axle-Bucamp MCP-Docusaurus up to 404bc028e15ec304c9a045528560f4b5f27a17e0. The affected element is the function update_document/continue_document/delete_document/get_content of the file app/routes/document.py. Performing a manipulation of the argument DOCS_DIR/path results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | Axle-Bucamp MCP-Docusaurus document.py get_content path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-05T14:13:44.456Z
Reserved: 2026-05-04T16:47:35.469Z
Link: CVE-2026-7788
Updated: 2026-05-05T13:23:12.272Z
Status : Deferred
Published: 2026-05-05T00:16:18.003
Modified: 2026-05-05T19:10:02.317
Link: CVE-2026-7788
No data.
OpenCVE Enrichment
Updated: 2026-05-06T09:22:17Z