
CVE-2026-31841: CVE-2026-31841: Raw Database Statement Exposure in Hyperterse MCP Search Tool
CVE-2026-31841: Raw Database Statement Exposure in Hyperterse MCP Search Tool Vulnerability ID: CVE-2026-31841 CVSS Score: 6.5 Published: 2026-03-12 Hyperterse versions 2.0.0 through 2.1.9 exhibit an information disclosure vulnerability (CWE-433) within the Model Context Protocol (MCP) server implementation. The search tool fails to sanitize internal tool representations before returning them to the client, leaking raw SQL database statements. This exposure provides attackers with deep insight into internal database schemas, table structures, and query logic, lowering the barrier for subsequent targeted attacks. TL;DR Hyperterse < 2.2.0 leaks internal SQL statements via the MCP search tool due to missing output sanitization, exposing database schema details to users and AI agents. ⚠️ Exploit Status: POC Technical Details Vulnerability Class : CWE-433: Unparsed Raw Web Content Delivery Attack Vector : Network (MCP callTool via JSON RPC) CVSS v3.1 Score : 6.5 (Medium) Confidentiality Imp
Continue reading on Dev.to
Opens in a new tab




