entry
Pack: cisa-kev · Endpoint: https://gateway.pipeworx.io/cisa-kev/mcp
Single KEV entry by CVE id.
Parameters
| Name | Type | Required | Description |
|---|---|---|---|
cve_id | string | yes |
Example call
curl -X POST https://gateway.pipeworx.io/cisa-kev/mcp \
-H 'Content-Type: application/json' \
-d '{"jsonrpc":"2.0","id":1,"method":"tools/call","params":{"name":"entry","arguments":{}}}'
Response shape
Full JSON Schema
{
"oneOf": [
{
"type": "object",
"properties": {
"cveID": {
"type": "string",
"description": "CVE identifier"
},
"vendorProject": {
"type": "string",
"description": "Vendor or project name"
},
"product": {
"type": "string",
"description": "Product name"
},
"vulnerabilityName": {
"type": "string",
"description": "Vulnerability name"
},
"dateAdded": {
"type": "string",
"description": "Date added to catalog (ISO format)"
},
"shortDescription": {
"type": "string",
"description": "Brief vulnerability description"
},
"requiredAction": {
"type": "string",
"description": "Recommended action"
},
"dueDate": {
"type": "string",
"description": "Due date for remediation"
},
"knownRansomwareCampaignUse": {
"type": "string",
"description": "Known ransomware campaign use"
},
"notes": {
"type": "string",
"description": "Additional notes"
},
"cwes": {
"type": "array",
"items": {
"type": "string"
},
"description": "Related CWE identifiers"
}
},
"required": [
"cveID",
"vendorProject",
"product",
"vulnerabilityName",
"dateAdded",
"shortDescription",
"requiredAction",
"dueDate"
]
},
{
"type": "null",
"description": "No entry found for the given CVE ID"
}
]
}
Connect
Add this to your MCP client config, or use one-click install buttons:
{
"mcpServers": {
"cisa-kev": {
"url": "https://gateway.pipeworx.io/cisa-kev/mcp"
}
}
}
See Getting Started for client-specific install steps.