Path Traversal Vulnerability in ggerve Coding Standards-MCP Product
CVE-2026-7588

6.9MEDIUM

Key Information:

Vendor

Ggerve

Vendor
CVE Published:
1 May 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-7588?

A path traversal vulnerability exists in the ggerve coding-standards-mcp product, specifically in the get_style_guide/get_best_practices function within the server.py file. The flaw arises from improper handling of the 'Language' argument, allowing attackers to traverse the file system remotely and access restricted directories or files. This vulnerability has been made publicly known and poses a risk to any installation of the product. Furthermore, while the project team has been notified about this issue via an issue report, they have yet to provide a response or patch to mitigate the risk.

Affected Version(s)

coding-standards-mcp 5b097a3d6ff668d15c610911d20d2ce0d08cfc5a

coding-standards-mcp 94f619198724f79d1ea53992184eb4ba61418810

coding-standards-mcp c21ab2754684329eab4feb72427dc9acfe61e52f

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
6.9
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

LargeW (VulDB User)
VulDB CNA Team
.