


Perceptive Security
SOC/SIEM Consultancy

A vulnerability was detected in eiceblue spire-doc-mcp-server 1.0.0. This affects the function get_doc_path of the file src/spire_doc_mcp/api/base.py. Performin…
Published:
27 april 2026 om 22:00:00
Alert date:
28 april 2026 om 23:02:15
Source:
nvd.nist.gov
Web Technologies, Supply Chain & Dependencies
A path traversal vulnerability (CVE-2026-7314) was discovered in eiceblue spire-doc-mcp-server version 1.0.0. The vulnerability affects the get_doc_path function in src/spire_doc_mcp/api/base.py file. Attackers can manipulate the document_name argument to achieve path traversal. The attack can be initiated remotely and the exploit is publicly available. The project maintainer was notified through an issue report but has not responded. This represents a high-risk vulnerability due to remote exploitability and public exploit availability.
Technical details
Mitigation steps:
Affected products:
eiceblue spire-doc-mcp-server
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-7314
https://github.com/eiceblue/spire-doc-mcp-server/
https://github.com/eiceblue/spire-doc-mcp-server/issues/1
https://vuldb.com/submit/803080
https://vuldb.com/vuln/359962
https://vuldb.com/vuln/359962/cti
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
