No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 04 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 04 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dayoooun
Dayoooun hwpx-mcp |
|
| Vendors & Products |
Dayoooun
Dayoooun hwpx-mcp |
Fri, 01 May 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in Dayoooun hwpx-mcp 0.2.0. This affects the function save_document/export_to_text/export_to_html of the file mcp-server/src/index.ts of the component MCP Interface. Performing a manipulation of the argument output_path results in path traversal. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | Dayoooun hwpx-mcp MCP index.ts export_to_html path traversal | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T17:52:24.973Z
Reserved: 2026-05-01T10:47:05.673Z
Link: CVE-2026-7599
Updated: 2026-05-04T16:12:12.384Z
Status : Received
Published: 2026-05-01T22:16:17.127
Modified: 2026-05-01T22:16:17.127
Link: CVE-2026-7599
No data.
OpenCVE Enrichment
Updated: 2026-05-04T16:07:14Z