Description
A security flaw has been discovered in Axle-Bucamp MCP-Docusaurus up to 404bc028e15ec304c9a045528560f4b5f27a17e0. The affected element is the function update_document/continue_document/delete_document/get_content of the file app/routes/document.py. Performing a manipulation of the argument DOCS_DIR/path results in path traversal. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The project was informed of the problem early through an issue report but has not responded yet.
Problem types
Product status
Timeline
| 2026-05-04: | Advisory disclosed |
| 2026-05-04: | VulDB entry created |
| 2026-05-04: | VulDB entry last update |
Credits
CPT_Penner (VulDB User)
VulDB CNA Team
References
vuldb.com/vuln/360994 (VDB-360994 | Axle-Bucamp MCP-Docusaurus document.py get_content path traversal)
vuldb.com/vuln/360994/cti (VDB-360994 | CTI Indicators (IOB, IOC, TTP, IOA))
vuldb.com/submit/807746 (Submit #807746 | Axle-Bucamp MCP-Docusaurus 404bc028e15ec304c9a045528560f4b5f27a17e0 Path Traversal)
github.com/Axle-Bucamp/MCP-Docusaurus/issues/2
github.com/Axle-Bucamp/MCP-Docusaurus/
