CVE-2026-7159
Description
A vulnerability was found in douinc mkdocs-mcp-plugin up to 0.4.1. This affects the function read_document/list_documents of the file server.py. Performing a manipulation of the argument docs_dir/file_path results in path traversal. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor confirms, that the "fix will be published within a few days."
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A path traversal vulnerability in douinc mkdocs-mcp-plugin up to 0.4.1 allows remote attackers to read arbitrary files via the docs_dir/file_path arguments.
Vulnerability
Overview
A path traversal vulnerability has been identified in the read_document and list_documents functions of the server.py file in the douinc mkdocs-mcp-plugin, affecting versions up to 0.4.1 [1]. By manipulating the docs_dir and file_path arguments, an attacker can traverse directories outside the intended root and access arbitrary files on the server.
Exploitation
The attack can be carried out remotely without any prior authentication, as the plugin's server interface exposes these functions over the network [1]. An attacker simply needs to craft a request with path traversal sequences (e.g., ../) in the file path parameter to read files outside the intended document root.
Impact
Successful exploitation allows an attacker to read sensitive files from the server file system, potentially including configuration files, credentials, or source code. This could lead to further compromise of the system or application [1].
Mitigation
The vendor has acknowledged the vulnerability and states that a fix will be published within a few days [1]. Until a patch is released, users should consider restricting network access to the plugin's server, or disabling the read_document/list_documents endpoints if not required.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
mkdocs-mcp-pluginPyPI | <= 0.4.1 | — |
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7News mentions
0No linked articles in our index yet.