Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in ryanjoachim mcp-rtfm 0.1.0. This vulnerability affects the function get_doc_content/read_doc/update_doc of the component MCP Interface. Such manipulation of the argument docFile leads to path traversal. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e6f0686fc36012f78236e7fed172c81444904b0b. It is best practice to apply a patch to resolve this issue. | |
| Title | ryanjoachim mcp-rtfm MCP update_doc path traversal | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T03:30:16.625Z
Reserved: 2026-05-03T16:01:32.322Z
Link: CVE-2026-7728
No data.
Status : Received
Published: 2026-05-04T05:16:00.977
Modified: 2026-05-04T05:16:00.977
Link: CVE-2026-7728
No data.
OpenCVE Enrichment
Updated: 2026-05-04T05:30:37Z