Impact
Hyperterse’s search tool exposed raw SQL statements that were meant to run only internally and not be shown to users or external systems. By returning the fully qualified queries as part of the search results, the tool inadvertently leaked sensitive database logic and schema details. This contemporary vulnerability aligns with CWE‑433 and can give a malicious actor or an LLM-based application a clear view of the database structure, potentially facilitating targeted injection attempts or other exploitation strategies. The confidentiality impact is significant, as the attacker learns how data is accessed and may identify opportunities for privilege escalation or data extraction.
Affected Systems
All Hyperterse deployments running any version earlier than the release labeled v2.2.0 are affected. The product family is identified by the CPE string cpe:2.3:a:hyperterse:hyperterse:*:*:*:*:*:*:*:*. The fix was released in version 2.2.0, where the search tool was modified to omit the raw SQL queries from the response.
Risk and Exploitability
The CVSS v3.1 score of 6.5 indicates a medium severity, and an EPSS score of less than 1% suggests a low probability of currently observed exploitation. The vulnerability is not listed in the CISA KEV catalog, implying no known widespread active exploitation. The attack vector is likely internal to the application or via an LLM integrated with the search tool, as the disclosure occurs when search results are generated. While no public exploit has been documented, the information revealed by the vulnerable code could assist an attacker in crafting more effective injection attacks or mapping the database schema.
OpenCVE Enrichment
Github GHSA