Skip to content

Vulnerability in docs-mcp-server project #388

@ankitdn

Description

@ankitdn

While working on docs-mcp-server project, expressions evaluated using mathjs should be safely handled, ensuring that user-provided input cannot modify internal object attributes or execute arbitrary JavaScript code. The expression parser should strictly sandbox inputs and prevent any unauthorized access or code execution.

CVE Report
CVE Link

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions