Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-92gp-jfgx-9qpv | Hyperterse: Raw exposure of database statements in MCP search tool |
Thu, 19 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:hyperterse:hyperterse:*:*:*:*:*:*:*:* |
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hyperterse
Hyperterse hyperterse |
|
| Vendors & Products |
Hyperterse
Hyperterse hyperterse |
Thu, 12 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces from declarative config. Prior to v2.2.0, the search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly. This issue has been fixed as of v2.2.0. | |
| Title | Raw exposure of database statements in Hyperterse MCP search tool | |
| Weaknesses | CWE-433 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T17:50:15.398Z
Reserved: 2026-03-09T17:41:56.078Z
Link: CVE-2026-31841
Updated: 2026-03-12T17:50:08.930Z
Status : Analyzed
Published: 2026-03-12T17:16:51.050
Modified: 2026-03-19T17:35:21.330
Link: CVE-2026-31841
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:48:51Z
Github GHSA