Description
Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces from declarative config. Prior to v2.2.0, the search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly. This issue has been fixed as of v2.2.0.
Published: 2026-03-12
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure
Action: Apply Patch
AI Analysis

Impact

Hyperterse’s search tool exposed raw SQL statements that were meant to run only internally and not be shown to users or external systems. By returning the fully qualified queries as part of the search results, the tool inadvertently leaked sensitive database logic and schema details. This contemporary vulnerability aligns with CWE‑433 and can give a malicious actor or an LLM-based application a clear view of the database structure, potentially facilitating targeted injection attempts or other exploitation strategies. The confidentiality impact is significant, as the attacker learns how data is accessed and may identify opportunities for privilege escalation or data extraction.

Affected Systems

All Hyperterse deployments running any version earlier than the release labeled v2.2.0 are affected. The product family is identified by the CPE string cpe:2.3:a:hyperterse:hyperterse:*:*:*:*:*:*:*:*. The fix was released in version 2.2.0, where the search tool was modified to omit the raw SQL queries from the response.

Risk and Exploitability

The CVSS v3.1 score of 6.5 indicates a medium severity, and an EPSS score of less than 1% suggests a low probability of currently observed exploitation. The vulnerability is not listed in the CISA KEV catalog, implying no known widespread active exploitation. The attack vector is likely internal to the application or via an LLM integrated with the search tool, as the disclosure occurs when search results are generated. While no public exploit has been documented, the information revealed by the vulnerable code could assist an attacker in crafting more effective injection attacks or mapping the database schema.

Generated by OpenCVE AI on March 19, 2026 at 18:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Hyperterse to version 2.2.0 or later to remove SQL query disclosure.

Generated by OpenCVE AI on March 19, 2026 at 18:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-92gp-jfgx-9qpv Hyperterse: Raw exposure of database statements in MCP search tool
History

Thu, 19 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:hyperterse:hyperterse:*:*:*:*:*:*:*:*

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Hyperterse
Hyperterse hyperterse
Vendors & Products Hyperterse
Hyperterse hyperterse

Thu, 12 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Description Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces from declarative config. Prior to v2.2.0, the search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly. This issue has been fixed as of v2.2.0.
Title Raw exposure of database statements in Hyperterse MCP search tool
Weaknesses CWE-433
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Hyperterse Hyperterse
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T17:50:15.398Z

Reserved: 2026-03-09T17:41:56.078Z

Link: CVE-2026-31841

cve-icon Vulnrichment

Updated: 2026-03-12T17:50:08.930Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-12T17:16:51.050

Modified: 2026-03-19T17:35:21.330

Link: CVE-2026-31841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:48:51Z

Weaknesses