Home

Description

A vulnerability was found in ggerve coding-standards-mcp. This issue affects the function get_style_guide/get_best_practices of the file server.py. The manipulation of the argument Language results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-01 | Updated 2026-05-01 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R
5.0AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:ND/RC:UR

Problem types

Path Traversal

Product status

5b097a3d6ff668d15c610911d20d2ce0d08cfc5a
affected

94f619198724f79d1ea53992184eb4ba61418810
affected

c21ab2754684329eab4feb72427dc9acfe61e52f
affected

Timeline

2026-05-01:Advisory disclosed
2026-05-01:VulDB entry created
2026-05-01:VulDB entry last update

Credits

LargeW (VulDB User) reporter

VulDB CNA Team coordinator

References

vuldb.com/vuln/360541 (VDB-360541 | ggerve coding-standards-mcp server.py get_best_practices path traversal) vdb-entry technical-description

vuldb.com/vuln/360541/cti (VDB-360541 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/804390 (Submit #804390 | ggerve coding-standards-mcp c21ab2754684329eab4feb72427dc9acfe61e52f Path Traversal) third-party-advisory

github.com/ggerve/coding-standards-mcp/issues/3 exploit issue-tracking

github.com/ggerve/coding-standards-mcp/ product

cve.org (CVE-2026-7588)

nvd.nist.gov (CVE-2026-7588)

Download JSON