<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Mkdocs — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/mkdocs/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 28 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/mkdocs/feed.xml" rel="self" type="application/rss+xml"/><item><title>mkdocs-mcp-plugin Path Traversal Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-mkdocs-path-traversal/</link><pubDate>Tue, 28 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mkdocs-path-traversal/</guid><description>A path traversal vulnerability exists in douinc mkdocs-mcp-plugin up to version 0.4.1, allowing remote attackers to access unauthorized files through manipulation of the docs_dir/file_path argument in the read_document/list_documents functions within server.py.</description><content:encoded><![CDATA[<p>A path traversal vulnerability, identified as CVE-2026-7159, has been discovered in douinc&rsquo;s mkdocs-mcp-plugin, affecting versions up to 0.4.1. The flaw resides within the <code>read_document</code> and <code>list_documents</code> functions of the <code>server.py</code> file. By manipulating the <code>docs_dir</code> or <code>file_path</code> arguments, a remote attacker can bypass intended access restrictions and potentially read sensitive files on the server. A public exploit is available, increasing the risk of exploitation. The vendor has acknowledged the vulnerability and plans to release a fix in the coming days. This vulnerability poses a significant risk to systems using the affected plugin, potentially exposing sensitive data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a server running a vulnerable version (&lt;= 0.4.1) of the <code>mkdocs-mcp-plugin</code>.</li>
<li>Attacker crafts a malicious HTTP request targeting the <code>read_document</code> or <code>list_documents</code> endpoint.</li>
<li>The crafted request includes a manipulated <code>docs_dir</code> or <code>file_path</code> parameter designed to traverse the file system. This commonly involves using sequences like <code>../</code> to move up directories.</li>
<li>The vulnerable <code>server.py</code> script fails to properly sanitize or validate the provided path.</li>
<li>The application attempts to read a file outside the intended document root, based on the attacker-controlled path.</li>
<li>If successful, the contents of the targeted file are returned in the HTTP response to the attacker.</li>
<li>The attacker can repeat this process to enumerate and access various sensitive files.</li>
<li>The attacker gains unauthorized access to sensitive information, potentially including configuration files, source code, or user data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this path traversal vulnerability (CVE-2026-7159) can lead to unauthorized access to sensitive files on the server. This could include configuration files, application source code, or user data. The impact ranges from information disclosure to potential compromise of the entire system, depending on the nature of the exposed data. Given the public availability of an exploit, affected systems are at increased risk of attack. The vendor is planning to release a fix soon.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch for mkdocs-mcp-plugin as soon as it is released by the vendor to remediate CVE-2026-7159.</li>
<li>Deploy the Sigma rule <code>Detect Mkdocs Path Traversal Attempt</code> to identify exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious URL patterns containing path traversal sequences like <code>../</code> targeting file access endpoints, as detailed in the Attack Chain.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>mkdocs</category><category>CVE-2026-7159</category></item></channel></rss>