Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/Tencent/WeKnora
  4. ›
  5. CVE-2026-30856

CVE-2026-30856: WeKnora Vulnerable to Tool Execution Hijacking via Ambigous Naming Convention In MCP client and Indirect Prompt Injection

March 6, 2026 (updated March 9, 2026)

A vulnerability involving tool name collision and indirect prompt injection allows a malicious remote MCP server to hijack tool execution. By exploiting an ambiguous naming convention in the MCP client (mcp_{service}_{tool}), an attacker can register a malicious tool that overwrites a legitimate one (e.g., tavily_extract). This enables the attacker to redirect LLM execution flow, exfiltrate system prompts, context, and potentially execute other tools with the user’s privileges.

References

  • forum.cursor.com/t/mcp-tools-name-collision-causing-cross-service-tool-call-failures/70946
  • github.com/Tencent/WeKnora
  • github.com/Tencent/WeKnora/security/advisories/GHSA-67q9-58vj-32qx
  • github.com/advisories/GHSA-67q9-58vj-32qx
  • modelcontextprotocol-security.io/ttps/tool-poisoning/tool-name-conflict
  • nvd.nist.gov/vuln/detail/CVE-2026-30856
  • www.elastic.co/security-labs/mcp-tools-attack-defense-recommendations

Code Behaviors & Features

Detect and mitigate CVE-2026-30856 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.3.0

Fixed versions

  • 0.3.0

Solution

Upgrade to version 0.3.0 or above.

Impact 5.9 MEDIUM

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:L

Learn more about CVSS

Weakness

  • CWE-706: Use of Incorrectly-Resolved Name or Reference

Source file

go/github.com/Tencent/WeKnora/CVE-2026-30856.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 25 Mar 2026 00:17:39 +0000.