<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MCP-Docusaurus — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/mcp-docusaurus/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 00:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/mcp-docusaurus/feed.xml" rel="self" type="application/rss+xml"/><item><title>Axle-Bucamp MCP-Docusaurus Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-mcp-docusaurus-path-traversal/</link><pubDate>Tue, 05 May 2026 00:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mcp-docusaurus-path-traversal/</guid><description>A path traversal vulnerability exists in Axle-Bucamp MCP-Docusaurus versions up to commit 404bc028e15ec304c9a045528560f4b5f27a17e0, allowing remote attackers to access sensitive files by manipulating the DOCS_DIR/path argument in specific functions.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in Axle-Bucamp MCP-Docusaurus, affecting versions up to commit 404bc028e15ec304c9a045528560f4b5f27a17e0. The vulnerability resides within the <code>update_document</code>, <code>continue_document</code>, <code>delete_document</code>, and <code>get_content</code> functions of the <code>app/routes/document.py</code> file. By manipulating the <code>DOCS_DIR/path</code> argument, a remote attacker can gain unauthorized access to sensitive files on the server. The exploit is publicly available, increasing the risk of exploitation. The vendor employs a rolling release model, making it difficult to pinpoint specific affected versions, and has not yet responded to vulnerability reports. This vulnerability poses a significant threat to the confidentiality of data managed by MCP-Docusaurus.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an MCP-Docusaurus instance running a vulnerable version (&lt;= 404bc028e15ec304c9a045528560f4b5f27a17e0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>update_document</code>, <code>continue_document</code>, <code>delete_document</code>, or <code>get_content</code> functions in <code>app/routes/document.py</code>.</li>
<li>The crafted request includes a modified <code>DOCS_DIR/path</code> argument containing path traversal sequences (e.g., <code>../</code>, <code>../../</code>).</li>
<li>The MCP-Docusaurus application processes the malicious request without proper validation of the <code>path</code> argument.</li>
<li>The application constructs a file path using the attacker-controlled <code>path</code> argument, resulting in access to files outside the intended <code>DOCS_DIR</code> directory.</li>
<li>The attacker successfully reads, modifies, or deletes arbitrary files on the server, depending on the function targeted and server permissions.</li>
<li>The attacker may escalate their access by retrieving sensitive configuration files containing credentials.</li>
<li>The attacker leverages compromised credentials to gain further access to the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows attackers to read sensitive files, potentially including configuration files, source code, and user data. Depending on the permissions of the application, attackers may also be able to modify or delete files, leading to data corruption or denial of service. Given the public availability of the exploit, organizations using vulnerable versions of MCP-Docusaurus are at high risk of compromise. The lack of vendor response further exacerbates the risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor web server logs for suspicious requests containing path traversal sequences (<code>../</code>, <code>../../</code>) in the URI, specifically targeting <code>app/routes/document.py</code> (see example Sigma rule below).</li>
<li>Implement input validation and sanitization for the <code>DOCS_DIR/path</code> argument in the <code>update_document</code>, <code>continue_document</code>, <code>delete_document</code>, and <code>get_content</code> functions.</li>
<li>Since specific version information is unavailable, prioritize upgrading to the latest version of MCP-Docusaurus as soon as a patch is released.</li>
<li>Audit access control configurations to limit the application&rsquo;s access to only necessary files and directories.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>web-application</category></item></channel></rss>