AlejandroArciniegas mcp-data-vis SQL Injection Vulnerability
A SQL injection vulnerability exists in the MCP Handler component of AlejandroArciniegas mcp-data-vis, specifically in the Request function of src/servers/database/server.js, allowing remote attackers to execute arbitrary SQL commands.
A SQL injection vulnerability has been identified in AlejandroArciniegas’s mcp-data-vis project, affecting the MCP Handler component. The vulnerability resides within the Request function of the src/servers/database/server.js file. This flaw allows a remote attacker to inject arbitrary SQL commands through manipulation of input parameters. Public exploit code is available, increasing the risk of exploitation. Due to the software’s rolling release model, identifying specific vulnerable versions is challenging. The vendor was notified but did not respond to the disclosure, potentially delaying remediation efforts and increasing the window of opportunity for malicious actors to exploit this vulnerability.
Attack Chain
- Attacker identifies a publicly accessible instance of mcp-data-vis.
- The attacker analyzes the
src/servers/database/server.jsfile to understand the structure of theRequestfunction. - The attacker crafts a malicious SQL injection payload targeting the
Requestfunction. - The attacker sends a specially crafted HTTP request containing the SQL injection payload to the vulnerable endpoint.
- The vulnerable
Requestfunction processes the malicious SQL query without proper sanitization. - The injected SQL code is executed against the backend database, potentially allowing data extraction.
- The attacker retrieves sensitive data from the database, such as user credentials or application configuration.
- The attacker could potentially use the compromised database to pivot to other systems within the network, or deface the web application.
Impact
Successful exploitation of this SQL injection vulnerability could lead to unauthorized access to sensitive data, including user credentials and application configurations. The lack of versioning information due to the rolling release model makes it difficult to identify and patch vulnerable instances. Organizations using mcp-data-vis are at risk of data breaches, service disruption, and potential compromise of their entire infrastructure if this vulnerability is exploited. Given the public availability of exploit code, the likelihood of exploitation is high, particularly for unpatched systems.
Recommendation
- Inspect and sanitize all user-provided input passed to the
Requestfunction insrc/servers/database/server.jswithin the mcp-data-vis application to prevent SQL injection. - Deploy the provided Sigma rule to detect suspicious network activity indicative of SQL injection attempts targeting the
Requestfunction. - Monitor web server logs for suspicious HTTP requests containing potentially malicious SQL syntax related to CVE-2026-5322.
- Implement a Web Application Firewall (WAF) with rules to block common SQL injection payloads targeting the mcp-data-vis application.
Detection coverage 2
Detect SQL Injection Attempts to mcp-data-vis
highDetects potential SQL injection attempts targeting the mcp-data-vis application by looking for common SQL syntax in HTTP request URIs.
Detect SQL Injection via POST Request to mcp-data-vis server.js
criticalDetects potential SQL injection attempts targeting the mcp-data-vis application via POST requests that contain SQL syntax in the body, specifically focusing on interaction with server.js.
Detection queries are kept inside the platform. Get full rules →