Raw exposure of database statements in Hyperterse MCP search tool
Description
Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces from declarative config. Prior to v2.2.0, the search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly. This issue has been fixed as of v2.2.0.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Hyperterse MCP framework prior to v2.2.0 exposed raw SQL queries in the search tool results, leaking internal statements.
CVE-2026-31841 describes an information disclosure vulnerability in Hyperterse, a tool-first MCP framework. The search tool, designed to allow LLMs to find tools using natural language, inadvertently returned the raw SQL queries that were supposed to be executed under the hood [1]. This exposure meant that database statements, which should have been protected from public display, were included in the search results.
To exploit this vulnerability, an attacker would need to interact with the Hyperterse service's MCP search endpoint. By crafting natural language queries, they could trigger the search functionality and receive the underlying SQL statements in the response. No special privileges or authentication bypass is required if the search tool is exposed to LLMs or users [4].
The impact is the leakage of sensitive database queries, which might reveal table names, column names, and potentially business logic or data access patterns. This could aid an attacker in further exploiting the database or gaining intelligence about the application's internals [1].
The vulnerability has been addressed in Hyperterse version 2.2.0. The fix ensures that the search results no longer include the 'statement' field; instead, clients should rely on other metadata such as 'name', 'description', 'relevance_score', and 'inputs' [3]. Users are advised to update to v2.2.0 or later to mitigate the issue.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
hypertersenpm | >= 2.0.0, < 2.2.0 | 2.2.0 |
Affected products
2- Range: < 2.2.0
- hyperterse/hypertersev5Range: >= 2.0.0, < 2.2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-92gp-jfgx-9qpvghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-31841ghsaADVISORY
- github.com/hyperterse/hyperterse/releases/tag/v2.2.0ghsax_refsource_MISCWEB
- github.com/hyperterse/hyperterse/security/advisories/GHSA-92gp-jfgx-9qpvghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.