Skip to content
CVSS 9.8 · CRITICAL

CVE-2026-26015

DocsGPT is a GPT-powered chat for documentation. From version 0.15.0 to before version 0.16.0, an attacker accessing both the official DocsGPT website or any local and public deployment, can craft a malicious payload bypassing the "MCP test" behavior to achieve arbitrary remote code execution (RCE). This issue has been patched in version 0.16.0.

Ver en NVD

Análisis

DocsGPT versions 0.15.0 through 0.15.x are vulnerable to a critical command injection flaw that allows unauthenticated remote code execution (RCE). Anyone running a self-hosted or public deployment of this tool should upgrade to version 0.16.0 immediately to prevent attackers from taking control of the server.

Severidad

Puntaje: 9.8(CRITICAL)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-77

EPSS

Probabilidad de explotación (próx. 30 días): 0.0028 (0.3%)
Percentil: 51.6%
EPSS: 2026-05-06

Afecta

arc53:docsgpt

Descripción técnica

DocsGPT is a GPT-powered chat for documentation. From version 0.15.0 to before version 0.16.0, an attacker accessing both the official DocsGPT website or any local and public deployment, can craft a malicious payload bypassing the "MCP test" behavior to achieve arbitrary remote code execution (RCE). This issue has been patched in version 0.16.0.

Publicada: 29/4/2026, 18:16:03
Última modificación: 6/5/2026, 20:16:31

Referencias

InicioEventosBlogRecursosEquipo