Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-5322: SQL Injection in AlejandroArciniegas mcp-data-vis

0
Medium
VulnerabilityCVE-2026-5322cvecve-2026-5322
Published: Thu Apr 02 2026 (04/02/2026, 05:30:15 UTC)
Source: CVE Database V5
Vendor/Project: AlejandroArciniegas
Product: mcp-data-vis

Description

A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/servers/database/server.js of the component MCP Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 06:08:33 UTC

Technical Analysis

CVE-2026-5322 is an SQL injection vulnerability identified in the mcp-data-vis project maintained by AlejandroArciniegas. The vulnerability resides in the Request function of the MCP Handler component, specifically in the src/servers/database/server.js file. Due to improper sanitization or validation of input parameters used in SQL queries, an attacker can craft malicious input that alters the intended SQL commands executed by the database. This can lead to unauthorized data access, modification, or deletion. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The product follows a rolling release model, which means updates are continuously delivered without fixed version numbers, complicating patch management. The vendor was notified early but did not respond, and public exploit details have been disclosed, raising the urgency for users to implement mitigations. The CVSS 4.0 base score is 6.9, reflecting medium severity, with network attack vector, low complexity, no privileges or user interaction needed, and partial impacts on confidentiality, integrity, and availability.

Potential Impact

The SQL injection vulnerability allows attackers to execute arbitrary SQL commands on the backend database, potentially leading to unauthorized data disclosure, data manipulation, or deletion. This can compromise the confidentiality and integrity of sensitive information stored within the database. Additionally, attackers may disrupt service availability by corrupting or deleting critical data. Since exploitation requires no authentication or user interaction and can be performed remotely, the attack surface is broad. Organizations relying on mcp-data-vis for data visualization or analytics could face data breaches, loss of trust, regulatory penalties, and operational disruptions. The continuous update model without clear versioning may delay patch deployment, increasing exposure time. The lack of vendor response further exacerbates risk, as no official patches or guidance have been provided. While no active exploitation is currently known, the public availability of exploit details increases the likelihood of future attacks.

Mitigation Recommendations

Organizations should immediately audit their use of mcp-data-vis to identify affected deployments. Given the absence of official patches, users should implement input validation and sanitization at the application or database query layer to prevent injection of malicious SQL code. Employ parameterized queries or prepared statements if modifying source code is feasible. Network-level protections such as web application firewalls (WAFs) can be configured to detect and block SQL injection patterns targeting the vulnerable endpoints. Monitoring and logging database queries for anomalous activity can help detect exploitation attempts early. Restrict database user privileges to the minimum necessary to limit potential damage from successful injection. If possible, isolate the mcp-data-vis service in a segmented network zone to reduce exposure. Stay alert for vendor updates or community patches and apply them promptly once available. Engage in threat intelligence sharing to track emerging exploit activity related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-04-01T13:03:33.607Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69ce044ee6bfc5ba1dac2508

Added to database: 4/2/2026, 5:53:18 AM

Last enriched: 4/2/2026, 6:08:33 AM

Last updated: 4/2/2026, 2:55:55 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses