CVE-2026-26015

DocsGPT is a GPT-powered chat for documentation. From version 0.15.0 to before version 0.16.0, an attacker accessing both the official DocsGPT website or any local and public deployment, can craft a malicious payload bypassing the "MCP test" behavior to achieve arbitrary remote code execution (RCE). This issue has been patched in version 0.16.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:arc53:docsgpt:0.15.0:*:*:*:*:*:*:*

History

01 May 2026, 12:56

Type Values Removed Values Added
First Time Arc53
Arc53 docsgpt
CPE cpe:2.3:a:arc53:docsgpt:0.15.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/arc53/DocsGPT/releases/tag/0.16.0 - () https://github.com/arc53/DocsGPT/releases/tag/0.16.0 - Release Notes
References () https://github.com/arc53/DocsGPT/security/advisories/GHSA-gcrq-f296-2j74 - () https://github.com/arc53/DocsGPT/security/advisories/GHSA-gcrq-f296-2j74 - Exploit, Vendor Advisory

30 Apr 2026, 15:48

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-29 18:16

Updated : 2026-05-01 12:56


NVD link : CVE-2026-26015

Mitre link : CVE-2026-26015

CVE.ORG link : CVE-2026-26015


JSON object : View

Products Affected

arc53

  • docsgpt
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')