Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. hyperterse
  4. ›
  5. CVE-2026-31841

CVE-2026-31841: Hyperterse: Raw exposure of database statements in MCP search tool

March 12, 2026

Hyperterse allows users to specify database queries for tools to execute under the hood. As of v2.0.0, there are only two tools exposed - search and execute.

The search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly.

This issue has been fixed as of v2.2.0 and relevant tests to catch these have been added.

References

  • github.com/advisories/GHSA-92gp-jfgx-9qpv
  • github.com/hyperterse/hyperterse
  • github.com/hyperterse/hyperterse/releases/tag/v2.2.0
  • github.com/hyperterse/hyperterse/security/advisories/GHSA-92gp-jfgx-9qpv
  • nvd.nist.gov/vuln/detail/CVE-2026-31841

Code Behaviors & Features

Detect and mitigate CVE-2026-31841 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.0.0 before 2.2.0

Fixed versions

  • 2.2.0

Solution

Upgrade to version 2.2.0 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-433: Unparsed Raw Web Content Delivery

Source file

npm/hyperterse/CVE-2026-31841.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:09 +0000.