| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-92gp-jfgx-9qpv | Hyperterse: Raw exposure of database statements in MCP search tool |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hyperterse
Hyperterse hyperterse |
|
| Vendors & Products |
Hyperterse
Hyperterse hyperterse |
Thu, 12 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces from declarative config. Prior to v2.2.0, the search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly. This issue has been fixed as of v2.2.0. | |
| Title | Raw exposure of database statements in Hyperterse MCP search tool | |
| Weaknesses | CWE-433 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T17:50:15.398Z
Reserved: 2026-03-09T17:41:56.078Z
Link: CVE-2026-31841
Updated: 2026-03-12T17:50:08.930Z
Status : Awaiting Analysis
Published: 2026-03-12T17:16:51.050
Modified: 2026-03-12T21:07:53.427
Link: CVE-2026-31841
No data.
OpenCVE Enrichment
Updated: 2026-03-13T09:50:55Z
Github GHSA