Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4593: SQL Injection Hibernate in erupts erupt

0
Medium
VulnerabilityCVE-2026-4593cvecve-2026-4593
Published: Mon Mar 23 2026 (03/23/2026, 16:55:59 UTC)
Source: CVE Database V5
Vendor/Project: erupts
Product: erupt

Description

A flaw has been found in erupts erupt bis 1.13.3. Affected by this vulnerability is the function EruptDataQuery of the file erupt-ai/src/main/java/xyz/erupt/ai/call/impl/EruptDataQuery.java of the component MCP Tool Interface. This manipulation causes sql injection hibernate. It is possible to initiate the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:23:30 UTC

Technical Analysis

CVE-2026-4593 identifies a SQL injection vulnerability in the erupt framework, specifically in the EruptDataQuery function located in erupt-ai/src/main/java/xyz/erupt/ai/call/impl/EruptDataQuery.java within the MCP Tool Interface component. The vulnerability arises from improper sanitization or validation of user-supplied input that is incorporated into Hibernate-based SQL queries, enabling attackers to inject malicious SQL code remotely. This flaw affects erupt versions 1.13.0 through 1.13.3. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and no user interaction needed (UI:N). The vulnerability impacts confidentiality, integrity, and availability to a limited extent (VC:L, VI:L, VA:L), and does not involve scope changes or security requirements. The vendor was notified early but has not issued any response or patch, and although an exploit is publicly available, no active exploitation campaigns have been reported. This vulnerability could allow attackers to extract sensitive data, modify database contents, or disrupt application functionality by exploiting the SQL injection via Hibernate ORM queries.

Potential Impact

The potential impact of CVE-2026-4593 includes unauthorized data disclosure, data manipulation, and possible service disruption within applications using the affected erupt versions. Since the vulnerability allows remote exploitation without authentication or user interaction, attackers can leverage it to access or alter sensitive information stored in backend databases. This could lead to data breaches, loss of data integrity, and potential downtime for critical business applications relying on erupt. Organizations that use erupt in environments handling sensitive or regulated data face compliance risks and reputational damage if exploited. Although the CVSS score is medium, the presence of a public exploit increases the risk of opportunistic attacks. The lack of vendor response and patches further exacerbates the threat, requiring organizations to implement compensating controls promptly.

Mitigation Recommendations

Given the absence of official patches, organizations should immediately audit their use of erupt framework versions 1.13.0 to 1.13.3 and identify any deployments of the vulnerable EruptDataQuery function. As a temporary mitigation, input validation and sanitization should be enforced rigorously at the application layer to prevent malicious SQL input from reaching the Hibernate queries. Employing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the affected endpoints can reduce exposure. Restricting network access to the affected services to trusted IPs and implementing strict least-privilege database user permissions can limit the damage potential. Monitoring logs for unusual query patterns or errors related to SQL injection attempts is critical for early detection. Organizations should also consider upgrading to a non-vulnerable version once available or applying community patches if any emerge. Finally, engaging with the erupt community or maintainers to encourage a timely patch release is advisable.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-22T11:59:29.171Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1754df4197a8e3b789141

Added to database: 3/23/2026, 5:15:57 PM

Last enriched: 3/30/2026, 8:23:30 PM

Last updated: 5/7/2026, 5:00:59 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses