dubydu sqlite-mcp SQL Injection Vulnerability (CVE-2026-7206)
A SQL injection vulnerability exists in dubydu sqlite-mcp version 0.1.0 and earlier within the extract_to_json function allowing remote exploitation through manipulation of the output_filename argument.
A SQL injection vulnerability, identified as CVE-2026-7206, has been discovered in dubydu’s sqlite-mcp software, affecting versions up to 0.1.0. The vulnerability resides within the extract_to_json function located in the src/entry.py file. An attacker can exploit this flaw by manipulating the output_filename argument, leading to the execution of arbitrary SQL commands. This vulnerability is remotely exploitable, meaning an attacker does not need local access to the system. A proof-of-concept exploit is publicly available, increasing the risk of active exploitation. Applying patch a5580cb992f4f6c308c9ffe6442b2e76709db548 is the recommended remediation.
Attack Chain
- An attacker identifies a vulnerable instance of dubydu sqlite-mcp running a version prior to the patched version.
- The attacker crafts a malicious request targeting the
extract_to_jsonfunction insrc/entry.py. - The attacker injects SQL code into the
output_filenameargument of the request. - The application processes the attacker-supplied
output_filenameargument without proper sanitization. - The unsanitized input is passed directly to the underlying SQLite database engine.
- The SQLite database executes the injected SQL commands, potentially allowing the attacker to read sensitive data, modify data, or execute system commands, depending on the application’s privileges and database configuration.
- The attacker retrieves the results of the injected SQL query, such as extracted data or confirmation of successful command execution.
- The attacker leverages the compromised database to achieve further objectives, such as data exfiltration or privilege escalation.
Impact
Successful exploitation of this SQL injection vulnerability (CVE-2026-7206) can allow an attacker to execute arbitrary SQL queries against the underlying SQLite database. This could lead to the disclosure of sensitive information, modification of data, or even complete compromise of the application and the system it resides on. The CVSS v3.1 base score is 7.3, indicating a high severity vulnerability. Given the public availability of an exploit, affected systems are at an elevated risk of attack.
Recommendation
- Apply the provided patch
a5580cb992f4f6c308c9ffe6442b2e76709db548to remediate CVE-2026-7206. - Implement input validation and sanitization measures to prevent SQL injection attacks, focusing on the
output_filenameparameter of theextract_to_jsonfunction. - Monitor web server logs for suspicious requests targeting the
extract_to_jsonfunction using the Sigma ruleDetect Suspicious sqlite-mcp Requests.
Detection coverage 2
Detect Suspicious sqlite-mcp Requests
highDetects suspicious requests targeting the extract_to_json function of sqlite-mcp which may indicate a SQL injection attempt.
Detect sqlite-mcp process spawning shell
criticalDetects sqlite-mcp spawning a shell process, potentially indicating command execution via SQL injection.
Detection queries are kept inside the platform. Get full rules →