VYPR
High severity7.3NVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2026-7159

CVE-2026-7159

Description

A vulnerability was found in douinc mkdocs-mcp-plugin up to 0.4.1. This affects the function read_document/list_documents of the file server.py. Performing a manipulation of the argument docs_dir/file_path results in path traversal. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor confirms, that the "fix will be published within a few days."

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A path traversal vulnerability in douinc mkdocs-mcp-plugin up to 0.4.1 allows remote attackers to read arbitrary files via the docs_dir/file_path arguments.

Vulnerability

Overview

A path traversal vulnerability has been identified in the read_document and list_documents functions of the server.py file in the douinc mkdocs-mcp-plugin, affecting versions up to 0.4.1 [1]. By manipulating the docs_dir and file_path arguments, an attacker can traverse directories outside the intended root and access arbitrary files on the server.

Exploitation

The attack can be carried out remotely without any prior authentication, as the plugin's server interface exposes these functions over the network [1]. An attacker simply needs to craft a request with path traversal sequences (e.g., ../) in the file path parameter to read files outside the intended document root.

Impact

Successful exploitation allows an attacker to read sensitive files from the server file system, potentially including configuration files, credentials, or source code. This could lead to further compromise of the system or application [1].

Mitigation

The vendor has acknowledged the vulnerability and states that a fix will be published within a few days [1]. Until a patch is released, users should consider restricting network access to the plugin's server, or disabling the read_document/list_documents endpoints if not required.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
mkdocs-mcp-pluginPyPI
<= 0.4.1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.