No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Alejandroarciniegas
Alejandroarciniegas mcp-data-vis |
|
| Vendors & Products |
Alejandroarciniegas
Alejandroarciniegas mcp-data-vis |
Thu, 02 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/servers/database/server.js of the component MCP Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | AlejandroArciniegas mcp-data-vis MCP server.js request sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-02T13:10:55.307Z
Reserved: 2026-04-01T13:03:33.607Z
Link: CVE-2026-5322
Updated: 2026-04-02T13:10:43.675Z
Status : Received
Published: 2026-04-02T06:16:23.530
Modified: 2026-04-02T06:16:23.530
Link: CVE-2026-5322
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:22:19Z