Description
A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/servers/database/server.js of the component MCP Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-02
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection leading to unauthorized database access
Action: Patch
AI Analysis

Impact

A vulnerability in the Request function of the MCP Handler allows an attacker to inject arbitrary SQL through crafted input, enabling unauthorized read, update, or delete operations against the underlying database. The flaw arises from unsanitized query construction, which directly incorporates user data into SQL statements. If exploited, an attacker could extract sensitive information, alter critical data, or disrupt service availability.

Affected Systems

The issue targets Alejandro Arciniegas’ mcp‑data‑vis platform, specifically the MCP Handler component within src/servers/database/server.js. Because the project follows a rolling‑release model, no fixed versions are identified; any deployment of the current codebase is vulnerable until a patch is released.

Risk and Exploitability

The vulnerability scores a 6.9 on CVSS, indicating medium severity. No EPSS ranking is available and the flaw is not listed in CISA’s KEV catalog. Attackers can most likely exploit the weakness over the network via the MCP Handler endpoint. With the exploit publicly disclosed, the risk to exposed installations remains significant until the vendor issues a fix.

Generated by OpenCVE AI on April 2, 2026 at 09:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update to the latest release of mcp‑data‑vis once a patch is available.
  • Restrict access to the MCP Handler endpoint to trusted hosts or networks.
  • Implement input validation or replace dynamic query construction with parameterized statements to eliminate injection.
  • Monitor database logs for anomalous query patterns and investigate suspicious activity.
  • Contact the developer or maintainers to request a formal patch or interim fix.

Generated by OpenCVE AI on April 2, 2026 at 09:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Alejandroarciniegas
Alejandroarciniegas mcp-data-vis
Vendors & Products Alejandroarciniegas
Alejandroarciniegas mcp-data-vis

Thu, 02 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 02 Apr 2026 08:00:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/servers/database/server.js of the component MCP Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
Title AlejandroArciniegas mcp-data-vis MCP server.js request sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Alejandroarciniegas Mcp-data-vis
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-02T13:10:55.307Z

Reserved: 2026-04-01T13:03:33.607Z

Link: CVE-2026-5322

cve-icon Vulnrichment

Updated: 2026-04-02T13:10:43.675Z

cve-icon NVD

Status : Received

Published: 2026-04-02T06:16:23.530

Modified: 2026-04-02T06:16:23.530

Link: CVE-2026-5322

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:22:19Z

Weaknesses