Impact
The vulnerability is an SQL injection in TimBroddin astro-mcp-server up to version 1.1.1, caused by unsanitized handling of the request.params.arguments argument in the src/index.ts file of the MCP Tool Query Construction component. An attacker can craft malicious input that is incorporated directly into a SQL statement executed by the server, allowing arbitrary SQL commands to be run. This flaw is classified as CWE-74 (Improper Handling of Character Data) and CWE-89 (SQL Injection), enabling unauthorized data access, modification, or deletion by a remote user.
Affected Systems
Affected systems are instances of TimBroddin:astro-mcp-server with versions circulating up to 1.1.1. The vulnerability is not reported beyond this version and the project is hosted on GitHub at the provided repository URL. No other vendors or products are listed as impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate severity vulnerability, and the EPSS score is not available, so the likelihood of exploitation cannot be quantified accurately. The vulnerability is not listed in CISA’s KEV catalog, but the public release of an exploit means that attackers can reach the remote endpoint to manipulate the argument and inject SQL. Attackers can target the vulnerable endpoint from outside the network by sending a crafted HTTP request, and because no patch is yet published, the risk remains persistent until remediation is applied.
OpenCVE Enrichment