Impact
A vulnerability in the Request function of the MCP Handler allows an attacker to inject arbitrary SQL through crafted input, enabling unauthorized read, update, or delete operations against the underlying database. The flaw arises from unsanitized query construction, which directly incorporates user data into SQL statements. If exploited, an attacker could extract sensitive information, alter critical data, or disrupt service availability.
Affected Systems
The issue targets Alejandro Arciniegas’ mcp‑data‑vis platform, specifically the MCP Handler component within src/servers/database/server.js. Because the project follows a rolling‑release model, no fixed versions are identified; any deployment of the current codebase is vulnerable until a patch is released.
Risk and Exploitability
The vulnerability scores a 6.9 on CVSS, indicating medium severity. No EPSS ranking is available and the flaw is not listed in CISA’s KEV catalog. Attackers can most likely exploit the weakness over the network via the MCP Handler endpoint. With the exploit publicly disclosed, the risk to exposed installations remains significant until the vendor issues a fix.
OpenCVE Enrichment