Metrics
Affected Vendors & Products
Fri, 01 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 01 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in ggerve coding-standards-mcp. This issue affects the function get_style_guide/get_best_practices of the file server.py. The manipulation of the argument Language results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | ggerve coding-standards-mcp server.py get_best_practices path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-01T18:14:53.475Z
Reserved: 2026-05-01T09:30:07.048Z
Link: CVE-2026-7588
Updated: 2026-05-01T18:14:41.640Z
Status : Deferred
Published: 2026-05-01T18:16:16.300
Modified: 2026-05-01T20:21:53.960
Link: CVE-2026-7588
No data.
OpenCVE Enrichment
No data.