Skip to content
CVSS 7.3 · HIGH

CVE-2026-7314

A vulnerability was detected in eiceblue spire-doc-mcp-server 1.0.0. This affects the function get_doc_path of the file src/spire_doc_mcp/api/base.py. Performing a manipulation of the argument document_name results in path traversal. The attack can be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Ver en NVD

Análisis

This is a path traversal vulnerability in a specific Model Context Protocol (MCP) server for the Spire.Doc library. While MCP is a popular emerging standard for AI tools, this specific implementation for a commercial document library is niche and unlikely to be widely deployed across the community infrastructure or common development stacks.

Severidad

Puntaje: 7.3(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
AV: NETWORK
AC: LOW
PR: NONE
UI: NONE
S: UNCHANGED
C: LOW
I: LOW
A: LOW
Tipo de falla (CWE): CWE-22

EPSS

Probabilidad de explotación (próx. 30 días): 0.0006 (0.1%)
Percentil: 18.6%
EPSS: 2026-05-06

Descripción técnica

A vulnerability was detected in eiceblue spire-doc-mcp-server 1.0.0. This affects the function get_doc_path of the file src/spire_doc_mcp/api/base.py. Performing a manipulation of the argument document_name results in path traversal. The attack can be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

Publicada: 28/4/2026, 22:16:51
Última modificación: 29/4/2026, 21:16:21

Referencias

InicioEventosBlogRecursosEquipo