Browse all 3 CVE security advisories affecting arc53. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Arc53 primarily serves as a web application framework used for building enterprise solutions. Historically, it has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, with three CVEs documented. The framework's security characteristics include its widespread adoption in critical infrastructure, which amplifies potential impact. While no major public incidents have been widely reported, the consistent presence of similar vulnerability classes across its CVE history suggests potential areas for improvement in input validation and access control mechanisms. Organizations implementing Arc53 should prioritize regular security assessments and timely patching to mitigate risks.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2026-26015 | Unauthenticated RCE in DocsGPT MCP STDIO Configuration — DocsGPTCWE-77 | 8.8AI | HighAI | 2026-04-29 |
| CVE-2025-0868 | Remote Code Execution in DocsGPT — DocsGPTCWE-95 | 9.8 | - | 2025-02-20 |
| CVE-2024-31451 | Limited file write in routes.py (GHSL-2023-250) — DocsGPTCWE-22 | 5.3 | Medium | 2024-04-16 |
This page lists every published CVE security advisory associated with arc53. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.