Description
WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a vulnerability involving tool name collision and indirect prompt injection allows a malicious remote MCP server to hijack tool execution. By exploiting an ambiguous naming convention in the MCP client (mcp_{service}_{tool}), an attacker can register a malicious tool that overwrites a legitimate one (e.g., tavily_extract). This enables the attacker to redirect LLM execution flow, exfiltrate system prompts, context, and potentially execute other tools with the user's privileges. This issue has been patched in version 0.3.0.
Published: 2026-03-07
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Tool Execution Hijacking
Action: Patch
AI Analysis

Impact

The vulnerability in Tencent WeKnora allows a malicious remote MCP server to hijack tool execution through an ambiguous naming convention exercised by the MCP client. By registering a malicious tool that shares an identifier with a legitimate tool, an attacker can overwrite the legitimate tool, redirect Lake Learning Model (LLM) execution flow, exfiltrate system prompts and context, and potentially invoke other tools with the user’s privileges. The weakness is an input validation flaw, classified as CWE‑706, which permits a takeover of the tool registry guardrails. The impact is limited to the scope of tool execution and data leakage rather than arbitrary code execution on the originating host.

Affected Systems

Tencent WeKnora instances running any version prior to 0.3.0 are affected. Vulnerable versions allow a remote MCP server to register malicious tools; versions 0.3.0 and later contain a patch that eliminates ambiguous naming and protects tool registration integrity.

Risk and Exploitability

The CVSS score of 5.9 indicates moderate severity, while the EPSS score of less than 1% reflects a very low yet non‑zero probability of exploitation in the wild. The vulnerability is not listed in the CISA Known Exploit Vulnerabilities catalog. Exploitation requires that an attacker control or compromise a remote MCP server; from there they can register a conflicting tool name. The attack vector is inferred to be remote, targeting the service endpoint that accepts tool submissions and performs the name lookup. No additional conditions such as privileged local access are required beyond remote control of the MCP server.

Generated by OpenCVE AI on April 16, 2026 at 10:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WeKnora to version 0.3.0 or later to apply the vendor fix
  • Configure strict tool‑name validation or enforce a whitelist to prevent ambiguous names from being registered
  • Disable or restrict access to the remote MCP server if it is not needed, limiting tool registration to trusted entities

Generated by OpenCVE AI on April 16, 2026 at 10:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-67q9-58vj-32qx WeKnora Vulnerable to Tool Execution Hijacking via Ambigous Naming Convention In MCP client and Indirect Prompt Injection
History

Mon, 13 Apr 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tencent:weknora:*:*:*:*:*:*:*:*

Mon, 09 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tencent
Tencent weknora
Vendors & Products Tencent
Tencent weknora

Sat, 07 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description WeKnora is an LLM-powered framework designed for deep document understanding and semantic retrieval. Prior to version 0.3.0, a vulnerability involving tool name collision and indirect prompt injection allows a malicious remote MCP server to hijack tool execution. By exploiting an ambiguous naming convention in the MCP client (mcp_{service}_{tool}), an attacker can register a malicious tool that overwrites a legitimate one (e.g., tavily_extract). This enables the attacker to redirect LLM execution flow, exfiltrate system prompts, context, and potentially execute other tools with the user's privileges. This issue has been patched in version 0.3.0.
Title WeKnora: Tool Execution Hijacking via Ambigous Naming Convention In MCP client and Indirect Prompt Injection
Weaknesses CWE-706
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-09T18:24:32.877Z

Reserved: 2026-03-05T21:27:35.342Z

Link: CVE-2026-30856

cve-icon Vulnrichment

Updated: 2026-03-09T17:52:23.787Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-07T17:15:53.210

Modified: 2026-04-13T14:43:36.147

Link: CVE-2026-30856

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T11:00:10Z

Weaknesses