Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33980: CWE-943: Improper Neutralization of Special Elements in Data Query Logic in pab1it0 adx-mcp-server

0
High
VulnerabilityCVE-2026-33980cvecve-2026-33980cwe-943
Published: Fri Mar 27 2026 (03/27/2026, 21:32:57 UTC)
Source: CVE Database V5
Vendor/Project: pab1it0
Product: adx-mcp-server

Description

Azure Data Explorer MCP Server is a Model Context Protocol (MCP) server that enables AI assistants to execute KQL queries and explore Azure Data Explorer (ADX/Kusto) databases through standardized interfaces. Versions up to and including 0.1.1 contain KQL (Kusto Query Language) injection vulnerabilities in three MCP tool handlers: `get_table_schema`, `sample_table_data`, and `get_table_details`. The `table_name` parameter is interpolated directly into KQL queries via f-strings without any validation or sanitization, allowing an attacker (or a prompt-injected AI agent) to execute arbitrary KQL queries against the Azure Data Explorer cluster. Commit 0abe0ee55279e111281076393e5e966335fffd30 patches the issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 21:51:35 UTC

Technical Analysis

CVE-2026-33980 is a KQL injection vulnerability classified under CWE-943 (Improper Neutralization of Special Elements in Data Query Logic) affecting the pab1it0 adx-mcp-server, a Model Context Protocol server that facilitates AI assistants in querying Azure Data Explorer (ADX) databases. The vulnerability exists in versions up to and including 1.1.0, where the 'table_name' parameter is directly embedded into KQL queries using Python f-strings without any sanitization or validation. This insecure coding practice allows an attacker or a prompt-injected AI agent to craft malicious input that alters the intended query logic, enabling arbitrary KQL query execution. The affected MCP tool handlers are get_table_schema, sample_table_data, and get_table_details, all of which interact with database metadata and data retrieval functions. Exploiting this flaw can lead to unauthorized data disclosure, data integrity compromise, and potential data manipulation within the Azure Data Explorer environment. The vulnerability requires only network access and low privileges, with no user interaction needed, making it relatively easy to exploit remotely. The issue was addressed in a code commit (0abe0ee55279e111281076393e5e966335fffd30) that introduced proper input validation and neutralization of special characters in the 'table_name' parameter. No known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 8.3 (High), reflecting the critical impact on confidentiality and integrity with low attack complexity and no user interaction required.

Potential Impact

The primary impact of CVE-2026-33980 is unauthorized access and manipulation of data within Azure Data Explorer clusters. Attackers exploiting this vulnerability can execute arbitrary KQL queries, potentially extracting sensitive information, modifying data, or disrupting data integrity. This can lead to data breaches, exposure of confidential business intelligence, and undermining trust in data accuracy. Since the vulnerability affects AI assistant interfaces, it also raises concerns about automated systems being manipulated to perform malicious queries. The availability impact is limited but could occur if malicious queries degrade cluster performance or cause resource exhaustion. Organizations relying on Azure Data Explorer for critical analytics and decision-making may face operational and reputational damage. The ease of exploitation combined with the high impact on confidentiality and integrity makes this a significant threat to any entity using the affected adx-mcp-server versions.

Mitigation Recommendations

1. Immediately upgrade the pab1it0 adx-mcp-server to version 1.1.1 or later where the vulnerability is patched. 2. Implement strict input validation and sanitization on all user-supplied parameters, especially 'table_name', to neutralize special characters and prevent query injection. 3. Employ least privilege principles for accounts accessing the MCP server to limit potential damage from exploitation. 4. Monitor and audit KQL query logs for unusual or unauthorized query patterns indicative of injection attempts. 5. Use network segmentation and firewall rules to restrict access to the MCP server to trusted sources only. 6. Consider deploying Web Application Firewalls (WAFs) or query filtering mechanisms that can detect and block suspicious KQL injection payloads. 7. Educate AI assistant developers and operators about the risks of prompt injection and enforce secure coding practices when integrating AI with data query interfaces. 8. Regularly review and update security policies for AI-driven data access to include threat modeling for injection attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-24T22:20:06.210Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c6fa4f3c064ed76ffa5f1d

Added to database: 3/27/2026, 9:44:47 PM

Last enriched: 3/27/2026, 9:51:35 PM

Last updated: 3/27/2026, 11:02:17 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses