Vulnerability Description
A vulnerability was detected in Dayoooun hwpx-mcp 0.2.0. This affects the function save_document/export_to_text/export_to_html of the file mcp-server/src/index.ts of the component MCP Interface. Performing a manipulation of the argument output_path results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/BruceJqs/public_exp/issues/28
- https://github.com/Dayoooun/hwpx-mcp/
- https://github.com/Dayoooun/hwpx-mcp/issues/3
- https://vuldb.com/submit/805608
- https://vuldb.com/vuln/360556
- https://vuldb.com/vuln/360556/cti
FAQ
What is CVE-2026-7599?
CVE-2026-7599 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was detected in Dayoooun hwpx-mcp 0.2.0. This affects the function save_document/export_to_text/export_to_html of the file mcp-server/src/index.ts of the component MCP Interface. Perfo...
How severe is CVE-2026-7599?
CVE-2026-7599 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7599?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.