CVE-2026-7159: douinc mkdocs-mcp-plugin Path Traversal Vulnerability
The National Vulnerability Database has disclosed CVE-2026-7159, a high-severity path traversal vulnerability (CVSS 7.3) in douinc mkdocs-mcp-plugin up to version 0.4.1. This flaw affects the read_document/list_documents functions within the server.py file. Attackers can manipulate docs_dir/file_path arguments to traverse directories, potentially accessing sensitive files outside the intended document root.
This vulnerability is remotely exploitable, meaning an attacker doesn’t need local access to compromise affected systems. A public exploit is already available, significantly increasing the immediate risk. The vendor has acknowledged the issue and stated a fix will be released “within a few days.” This timeline is critical, as public exploits often lead to rapid weaponization.
Defenders must prioritize patching this vulnerability immediately upon release of the fix. Given the remote exploitability and public exploit code, any unpatched instance of mkdocs-mcp-plugin is a clear target. CISOs should ensure their development and documentation environments are inventoried for this plugin and ready for urgent updates.
What This Means For You
- If your organization uses douinc mkdocs-mcp-plugin, you are exposed to a high-severity, remotely exploitable path traversal. An attacker can read arbitrary files from your server. Identify all instances of this plugin, especially those exposed to the internet, and prepare to patch them the moment a fix is available. Audit logs for unusual file access attempts.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7159: mkdocs-mcp-plugin Path Traversal Attempt
title: CVE-2026-7159: mkdocs-mcp-plugin Path Traversal Attempt
id: scw-2026-04-27-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2026-7159 by looking for path traversal sequences ('../') within the URI and specific parameters ('docs_dir', 'file_path') known to be vulnerable in the douinc mkdocs-mcp-plugin.
author: SCW Feed Engine (AI-generated)
date: 2026-04-27
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7159/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/../'
cs-uri-query|contains:
- 'docs_dir='
- 'file_path='
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7159 | Path Traversal | douinc mkdocs-mcp-plugin up to version 0.4.1 |
| CVE-2026-7159 | Path Traversal | Vulnerable file: server.py |
| CVE-2026-7159 | Path Traversal | Vulnerable functions: read_document, list_documents |
| CVE-2026-7159 | Path Traversal | Vulnerable arguments: docs_dir, file_path |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 28, 2026 at 01:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.