Loading
Generated remediation guidance and an executive summary. No account required.
A vulnerability was detected in eiceblue spire-doc-mcp-server 1.0.0. This affects the function get_doc_path of the file src/spire_doc_mcp/api/base.py. Performing a manipulation of the argument document_name results in path traversal. The attack can be initiated remotely. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
No affected products information available.
Use CWE-22 to widen CVE-2026-7314 into its surrounding weakness, vendor, and product context.