Path Traversal Vulnerability in Eiceblue Spire-Doc-MCP-Server Product
CVE-2026-7314
Key Information:
- Vendor
Eiceblue
- Status
- Vendor
- CVE Published:
- 28 April 2026
Badges
What is CVE-2026-7314?
A vulnerability has been identified in Eiceblue's Spire-Doc-MCP-Server version 1.0.0, specifically in the 'get_doc_path' function located in 'src/spire_doc_mcp/api/base.py'. This flaw allows an attacker to manipulate the 'document_name' argument, leading to potential path traversal. Such an attack can be executed remotely, and with the exploit becoming public, there is an increased risk of associated threats. Although the project was alerted early about this vulnerability via an issue report, no response has been documented yet.
Affected Version(s)
spire-doc-mcp-server 1.0.0
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
