Ghostwire

CVE-2026-7588: A vulnerability was found in ggerve coding-standards-mcp. This issue affects the function...

MEDIUM CVSS 5.5 EPSS 0.04%

Published: May 1, 2026 | Last Modified: May 1, 2026

Description

A vulnerability was found in ggerve coding-standards-mcp. This issue affects the function get_style_guide/get_best_practices of the file server.py. The manipulation of the argument Language results in path traversal. It is possible to launch the attack remotely. The exploit has been made public and could be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The project was informed of the problem early through an issue report but has not responded yet.

Ghostwire Analysis — What This Means Practically

Exploitation Probability (EPSS): Low — 0.04% (13th percentile)

Low exploitation probability based on current threat landscape data. Standard patching timeline is appropriate.

This analysis is generated by Ghostwire from NVD, CISA KEV, EPSS, and open-source intelligence data. Verify findings through primary sources before acting.

Security Coverage (2 articles)

References