Metrics
Affected Vendors & Products
Mon, 04 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ryanjoachim
Ryanjoachim mcp-rtfm |
|
| Vendors & Products |
Ryanjoachim
Ryanjoachim mcp-rtfm |
Mon, 04 May 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in ryanjoachim mcp-rtfm 0.1.0. This vulnerability affects the function get_doc_content/read_doc/update_doc of the component MCP Interface. Such manipulation of the argument docFile leads to path traversal. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e6f0686fc36012f78236e7fed172c81444904b0b. It is best practice to apply a patch to resolve this issue. | |
| Title | ryanjoachim mcp-rtfm MCP update_doc path traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T17:50:05.370Z
Reserved: 2026-05-03T16:01:32.322Z
Link: CVE-2026-7728
Updated: 2026-05-04T16:37:43.907Z
Status : Deferred
Published: 2026-05-04T05:16:00.977
Modified: 2026-05-04T15:18:40.077
Link: CVE-2026-7728
No data.
OpenCVE Enrichment
Updated: 2026-05-04T16:06:09Z