DocsGPT is a GPT-powered chat for documentation. From version 0.15.0 to before version 0.16.0, an attacker accessing both the official DocsGPT website or any local and public deployment, can craft a malicious payload bypassing the "MCP test" behavior to achieve arbitrary remote code execution (RCE). This issue has been patched in version 0.16.0.
References
| Link | Resource |
|---|---|
| https://github.com/arc53/DocsGPT/releases/tag/0.16.0 | Release Notes |
| https://github.com/arc53/DocsGPT/security/advisories/GHSA-gcrq-f296-2j74 | Exploit Vendor Advisory |
| https://github.com/arc53/DocsGPT/security/advisories/GHSA-gcrq-f296-2j74 | Exploit Vendor Advisory |
Configurations
History
01 May 2026, 12:56
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Arc53
Arc53 docsgpt |
|
| CPE | cpe:2.3:a:arc53:docsgpt:0.15.0:*:*:*:*:*:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| References | () https://github.com/arc53/DocsGPT/releases/tag/0.16.0 - Release Notes | |
| References | () https://github.com/arc53/DocsGPT/security/advisories/GHSA-gcrq-f296-2j74 - Exploit, Vendor Advisory |
30 Apr 2026, 15:48
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-29 18:16
Updated : 2026-05-01 12:56
NVD link : CVE-2026-26015
Mitre link : CVE-2026-26015
CVE.ORG link : CVE-2026-26015
JSON object : View
Products Affected
arc53
- docsgpt
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
