Skip to content
CVSS 7.3 · HIGH

CVE-2026-7788

A security flaw has been discovered in Axle-Bucamp MCP-Docusaurus up to 404bc028e15ec304c9a045528560f4b5f27a17e0. The affected element is the function update_document/continue_document/delete_document/get_content of the file app/routes/document.py. Performing a manipulation of the argument DOCS_DIR/path results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.

View on NVD

Analysis

This path traversal vulnerability affects a specific integration project called Axle-Bucamp MCP-Docusaurus rather than the core Docusaurus framework. While the flaw allows remote attackers to manipulate file paths and an exploit is public, the project has very limited deployment and does not represent a systemic risk to the broader developer community.

Severity

Score: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Weakness (CWE): CWE-22

EPSS

Probability of exploitation (next 30 days): 0.0005 (0.0%)
Percentile: 13.9%
EPSS: 2026-05-06

Technical description

A security flaw has been discovered in Axle-Bucamp MCP-Docusaurus up to 404bc028e15ec304c9a045528560f4b5f27a17e0. The affected element is the function update_document/continue_document/delete_document/get_content of the file app/routes/document.py. Performing a manipulation of the argument DOCS_DIR/path results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.

Published: 5/5/2026, 12:16:18 AM
Last modified: 5/5/2026, 7:10:02 PM

References

HomeEventsBlogResourcesTeam