Axle-Bucamp MCP-Docusaurus Path Traversal (CVE-2026-7788) Public Exploit
The National Vulnerability Database has disclosed CVE-2026-7788, a high-severity path traversal vulnerability impacting Axle-Bucamp MCP-Docusaurus up to commit 404bc028e15ec304c9a045528560f4b5f27a17e0. This flaw resides in the update_document/continue_document/delete_document/get_content functions within app/routes/document.py, where manipulating the DOCS_DIR/path argument allows for remote path traversal. The CVSS score is 7.3 (HIGH).
What’s critical here is that a public exploit for CVE-2026-7788 is already available. This drastically lowers the bar for attackers, making exploitation trivial for anyone with basic scripting knowledge. Axle-Bucamp MCP-Docusaurus utilizes a rolling release model, meaning specific versioning for affected or patched releases isn’t readily available, which complicates defensive efforts. The project was reportedly informed but has not yet responded.
Attackers can leverage this path traversal to potentially read, write, or delete arbitrary files on the server, depending on the application’s permissions. This could lead to sensitive data exposure, code execution by overwriting configuration files, or even full system compromise. The remote attack vector makes this a prime target for opportunistic scanning and exploitation.
What This Means For You
- If your organization uses Axle-Bucamp MCP-Docusaurus, you are immediately exposed. Given the public exploit and remote attack vector, assume active exploitation is imminent. Identify all instances of this product within your environment and implement network segmentation to limit exposure. Patching is critical, but without specific version guidance, you need to monitor the project's repository for any security-related updates or workarounds. Review your WAF logs for attempts to manipulate file paths.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-7788 - Axle-Bucamp MCP-Docusaurus Path Traversal
title: CVE-2026-7788 - Axle-Bucamp MCP-Docusaurus Path Traversal
id: scw-2026-05-05-ai-1
status: experimental
level: high
description: |
Detects attempts to exploit CVE-2026-7788 by looking for requests to the vulnerable 'app/routes/document.py' file with path traversal sequences in the query parameters, specifically targeting the 'DOCS_DIR' or 'path' arguments. This is a primary indicator of an attempted remote exploit.
author: SCW Feed Engine (AI-generated)
date: 2026-05-05
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-7788/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/app/routes/document.py'
cs-uri-query|contains:
- 'DOCS_DIR/../'
- 'path/../../'
cs-method:
- 'POST'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-7788 | Path Traversal | Axle-Bucamp MCP-Docusaurus up to commit 404bc028e15ec304c9a045528560f4b5f27a17e0 |
| CVE-2026-7788 | Path Traversal | Vulnerable file: app/routes/document.py |
| CVE-2026-7788 | Path Traversal | Vulnerable functions: update_document, continue_document, delete_document, get_content |
| CVE-2026-7788 | Path Traversal | Vulnerable argument: DOCS_DIR/path |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 05, 2026 at 03:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.