Path Traversal Vulnerability in ggerve Coding Standards-MCP Product
CVE-2026-7588
Key Information:
- Vendor
Ggerve
- Status
- Vendor
- CVE Published:
- 1 May 2026
Badges
What is CVE-2026-7588?
A path traversal vulnerability exists in the ggerve coding-standards-mcp product, specifically in the get_style_guide/get_best_practices function within the server.py file. The flaw arises from improper handling of the 'Language' argument, allowing attackers to traverse the file system remotely and access restricted directories or files. This vulnerability has been made publicly known and poses a risk to any installation of the product. Furthermore, while the project team has been notified about this issue via an issue report, they have yet to provide a response or patch to mitigate the risk.
Affected Version(s)
coding-standards-mcp 5b097a3d6ff668d15c610911d20d2ce0d08cfc5a
coding-standards-mcp 94f619198724f79d1ea53992184eb4ba61418810
coding-standards-mcp c21ab2754684329eab4feb72427dc9acfe61e52f
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
