CVE-2026-7588

A vulnerability was found in ggerve coding-standards-mcp. This issue affects the function get_style_guide/get_best_practices of the file server.py. The manipulation of the argument Language results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.
Configurations

No configuration.

History

01 May 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-05-01 18:16

Updated : 2026-05-01 20:21


NVD link : CVE-2026-7588

Mitre link : CVE-2026-7588

CVE.ORG link : CVE-2026-7588


JSON object : View

Products Affected

No product.

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')