Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1977: Code Injection in isaacwasserman mcp-vegalite-server

0
Medium
VulnerabilityCVE-2026-1977cvecve-2026-1977
Published: Fri Feb 06 2026 (02/06/2026, 03:32:06 UTC)
Source: CVE Database V5
Vendor/Project: isaacwasserman
Product: mcp-vegalite-server

Description

A security vulnerability has been detected in isaacwasserman mcp-vegalite-server up to 16aefed598b8cd897b78e99b907f6e2984572c61. Affected by this vulnerability is the function eval of the component visualize_data. Such manipulation of the argument vegalite_specification leads to code injection. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:03:10 UTC

Technical Analysis

CVE-2026-1977 identifies a code injection vulnerability in the isaacwasserman mcp-vegalite-server, a tool used for rendering Vega-Lite visualizations. The flaw exists in the eval function within the visualize_data component, which processes the vegalite_specification argument. Improper sanitization or validation of this input allows attackers to inject malicious code that the server executes. The vulnerability is remotely exploitable without user interaction, though it requires low-level privileges (PR:L). The product’s rolling release model means version identifiers are commit hashes rather than traditional version numbers, complicating patch management and vulnerability tracking. The vulnerability was responsibly disclosed early to the project maintainers, but no response or patch has been provided as of the publication date. The CVSS 4.0 score of 5.3 reflects a medium severity, considering the network attack vector, low complexity, no user interaction, and partial impact on confidentiality, integrity, and availability. The lack of known exploits in the wild suggests limited active exploitation but the public disclosure increases risk. This vulnerability could allow attackers to execute arbitrary code on the server, potentially leading to data breaches, system compromise, or service disruption.

Potential Impact

The impact of CVE-2026-1977 is significant for organizations relying on the mcp-vegalite-server for data visualization and analytics. Successful exploitation can lead to arbitrary code execution, enabling attackers to compromise system confidentiality by accessing sensitive data, integrity by altering visualizations or underlying data, and availability by disrupting server operations. Since the vulnerability is remotely exploitable without user interaction, attackers can launch automated attacks at scale. The rolling release nature of the product complicates timely patching, increasing exposure duration. Organizations in sectors such as finance, healthcare, government, and technology that use this server for critical data visualization may face data leaks, manipulation of analytical outputs, or full system takeover. The medium severity rating indicates a moderate but actionable risk, especially in environments where the server is exposed to untrusted networks or integrated into larger data processing pipelines.

Mitigation Recommendations

To mitigate CVE-2026-1977, organizations should first isolate the mcp-vegalite-server from untrusted networks, restricting access to trusted users and systems only. Employ network-level controls such as firewalls and VPNs to limit exposure. Since no official patch is available, consider implementing input validation and sanitization at the application or proxy layer to block malicious vegalite_specification payloads. Review and harden server configurations to minimize privileges and disable or restrict the use of eval or similar dynamic code execution functions where feasible. Monitor server logs for unusual or suspicious input patterns indicative of injection attempts. Engage with the project maintainers or community to track updates or unofficial patches. Additionally, consider deploying runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules targeting this vulnerability. Finally, maintain an incident response plan to quickly address any suspected exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-05T13:36:38.321Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69856acdf9fa50a62fd0a378

Added to database: 2/6/2026, 4:15:09 AM

Last enriched: 2/23/2026, 10:03:10 PM

Last updated: 3/23/2026, 11:35:45 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses