CVE-2026-5322 PUBLISHED

AlejandroArciniegas mcp-data-vis MCP server.js request sql injection

Assigner: VulDB
Reserved: 01.04.2026 Published: 02.04.2026 Updated: 02.04.2026

A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/servers/database/server.js of the component MCP Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.9

Product Status

Vendor AlejandroArciniegas
Product mcp-data-vis
Versions
  • Version bc597e391f184d2187062fd567599a3cb72adf51 is affected
  • Version de5a51525a69822290eaee569a1ab447b490746d is affected

Credits

  • BigW (VulDB User) reporter
  • VulDB coordinator

References

Problem Types

  • SQL Injection CWE
  • Injection CWE