Vulnerability Description
A vulnerability was identified in ryanjoachim mcp-rtfm 0.1.0. This vulnerability affects the function get_doc_content/read_doc/update_doc of the component MCP Interface. Such manipulation of the argument docFile leads to path traversal. The attack can be launched remotely. The exploit is publicly available and might be used. The name of the patch is e6f0686fc36012f78236e7fed172c81444904b0b. It is best practice to apply a patch to resolve this issue.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/BruceJqs/public_exp/issues/35
- https://github.com/ryanjoachim/mcp-rtfm/
- https://github.com/ryanjoachim/mcp-rtfm/commit/e6f0686fc36012f78236e7fed172c8144
- https://github.com/ryanjoachim/mcp-rtfm/issues/5
- https://vuldb.com/submit/807538
- https://vuldb.com/vuln/360903
- https://vuldb.com/vuln/360903/cti
FAQ
What is CVE-2026-7728?
CVE-2026-7728 is a vulnerability with a CVSS score of 6.3 (MEDIUM). A vulnerability was identified in ryanjoachim mcp-rtfm 0.1.0. This vulnerability affects the function get_doc_content/read_doc/update_doc of the component MCP Interface. Such manipulation of the argum...
How severe is CVE-2026-7728?
CVE-2026-7728 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-7728?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.