Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-26015

DocsGPT is a GPT-powered chat for documentation. From version 0.15.0 to before version 0.16.0, an attacker accessing both the official DocsGPT website or any local and public deployment, can craft a malicious payload bypassing the "MCP test" behavior to achieve arbitrary remote code execution (RCE). This issue has been patched in version 0.16.0.

View on NVD

Analysis

DocsGPT versions 0.15.0 through 0.15.x are vulnerable to a critical command injection flaw that allows unauthenticated remote code execution (RCE). Anyone running a self-hosted or public deployment of this tool should upgrade to version 0.16.0 immediately to prevent attackers from taking control of the server.

Severity

Score: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-77

EPSS

Probability of exploitation (next 30 days): 0.0028 (0.3%)
Percentile: 51.6%
EPSS: 2026-05-06

Affects

arc53:docsgpt

Technical description

DocsGPT is a GPT-powered chat for documentation. From version 0.15.0 to before version 0.16.0, an attacker accessing both the official DocsGPT website or any local and public deployment, can craft a malicious payload bypassing the "MCP test" behavior to achieve arbitrary remote code execution (RCE). This issue has been patched in version 0.16.0.

Published: 4/29/2026, 6:16:03 PM
Last modified: 5/6/2026, 8:16:31 PM

References

HomeEventsBlogResourcesTeam