Vulnerability Description
A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/servers/database/server.js of the component MCP Handler. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product uses a rolling release model to deliver continuous updates. As a result, specific version information for affected or updated releases is not available. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/wing3e/public_exp/issues/19
- https://vuldb.com/submit/780731
- https://vuldb.com/vuln/354654
- https://vuldb.com/vuln/354654/cti
FAQ
What is CVE-2026-5322?
CVE-2026-5322 is a vulnerability with a CVSS score of 7.3 (HIGH). A vulnerability has been found in AlejandroArciniegas mcp-data-vis bc597e391f184d2187062fd567599a3cb72adf51/de5a51525a69822290eaee569a1ab447b490746d. This affects the function Request of the file src/...
How severe is CVE-2026-5322?
CVE-2026-5322 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5322?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.