top of page
perceptive_background_267k.jpg

A vulnerability was detected in eiceblue spire-doc-mcp-server 1.0.0. This affects the function get_doc_path of the file src/spire_doc_mcp/api/base.py. Performin…

Published:

27 april 2026 om 22:00:00

Alert date:

28 april 2026 om 23:02:15

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Supply Chain & Dependencies

A path traversal vulnerability (CVE-2026-7314) was discovered in eiceblue spire-doc-mcp-server version 1.0.0. The vulnerability affects the get_doc_path function in src/spire_doc_mcp/api/base.py file. Attackers can manipulate the document_name argument to achieve path traversal. The attack can be initiated remotely and the exploit is publicly available. The project maintainer was notified through an issue report but has not responded. This represents a high-risk vulnerability due to remote exploitability and public exploit availability.

Technical details

Mitigation steps:

Affected products:

eiceblue spire-doc-mcp-server

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page