Vulnerability Description
Azure Data Explorer MCP Server is a Model Context Protocol (MCP) server that enables AI assistants to execute KQL queries and explore Azure Data Explorer (ADX/Kusto) databases through standardized interfaces. Versions up to and including 0.1.1 contain KQL (Kusto Query Language) injection vulnerabilities in three MCP tool handlers: `get_table_schema`, `sample_table_data`, and `get_table_details`. The `table_name` parameter is interpolated directly into KQL queries via f-strings without any validation or sanitization, allowing an attacker (or a prompt-injected AI agent) to execute arbitrary KQL queries against the Azure Data Explorer cluster. Commit 0abe0ee55279e111281076393e5e966335fffd30 patches the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pab1It0 | Azure Data Explorer Mcp Server | <= 0.1.0 |
Related Weaknesses (CWE)
References
- https://github.com/pab1it0/adx-mcp-server/commit/0abe0ee55279e111281076393e5e966Patch
- https://github.com/pab1it0/adx-mcp-server/security/advisories/GHSA-vphc-468g-8rfExploitVendor Advisory
- https://github.com/pab1it0/adx-mcp-server/security/advisories/GHSA-vphc-468g-8rfExploitVendor Advisory
FAQ
What is CVE-2026-33980?
CVE-2026-33980 is a vulnerability with a CVSS score of 8.3 (HIGH). Azure Data Explorer MCP Server is a Model Context Protocol (MCP) server that enables AI assistants to execute KQL queries and explore Azure Data Explorer (ADX/Kusto) databases through standardized int...
How severe is CVE-2026-33980?
CVE-2026-33980 has been rated HIGH with a CVSS base score of 8.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33980?
Check the references section above for vendor advisories and patch information. Affected products include: Pab1It0 Azure Data Explorer Mcp Server.