<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Spire-Doc-Mcp-Server 1.0.0 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/spire-doc-mcp-server-1.0.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 29 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/spire-doc-mcp-server-1.0.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>eiceblue spire-doc-mcp-server Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-spire-doc-mcp-server-path-traversal/</link><pubDate>Wed, 29 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-spire-doc-mcp-server-path-traversal/</guid><description>A path traversal vulnerability exists in eiceblue spire-doc-mcp-server version 1.0.0, allowing a remote attacker to access arbitrary files by manipulating the 'document_name' argument in the 'get_doc_path' function.</description><content:encoded><![CDATA[<p>A critical path traversal vulnerability has been identified in eiceblue spire-doc-mcp-server version 1.0.0. The vulnerability resides within the <code>get_doc_path</code> function of the <code>src/spire_doc_mcp/api/base.py</code> file. By manipulating the <code>document_name</code> argument, an attacker can bypass intended directory restrictions and access files outside the designated document path. This attack can be initiated remotely without authentication, posing a significant risk. Public exploits are available, increasing the likelihood of exploitation. The vendor was notified through an issue report, but has not yet responded.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends a crafted HTTP request to the spire-doc-mcp-server.</li>
<li>The request targets an endpoint that utilizes the vulnerable <code>get_doc_path</code> function.</li>
<li>The attacker manipulates the <code>document_name</code> parameter within the request.</li>
<li>The <code>document_name</code> parameter contains a path traversal sequence (e.g., &ldquo;../&rdquo;) designed to escape the intended directory.</li>
<li>The <code>get_doc_path</code> function fails to properly sanitize or validate the <code>document_name</code> input.</li>
<li>The application constructs a file path based on the malicious input.</li>
<li>The application attempts to read the file at the attacker-controlled path.</li>
<li>The attacker successfully retrieves the contents of an arbitrary file on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability allows an attacker to read sensitive files on the server. This could include configuration files containing credentials, source code, or other confidential data. The CVSS v3.1 score of 7.3 reflects the high severity of this issue. The lack of vendor response and availability of public exploits significantly increases the risk to organizations using vulnerable versions of spire-doc-mcp-server.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule <code>Detect Spire-doc-mcp-server Path Traversal Attempt</code> to your SIEM to detect exploitation attempts by monitoring web server logs for path traversal sequences.</li>
<li>Apply input validation and sanitization to the <code>document_name</code> argument in the <code>get_doc_path</code> function within <code>src/spire_doc_mcp/api/base.py</code> to prevent path traversal.</li>
<li>Monitor web server logs for HTTP requests containing path traversal sequences (e.g., &ldquo;..%2F&rdquo;, &ldquo;../&rdquo;) targeting endpoints related to document retrieval.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>web-application</category><category>cve-2026-7314</category></item></channel></rss>