VYPR
Medium severity6.3NVD Advisory· Published May 1, 2026· Updated May 1, 2026

CVE-2026-7591

CVE-2026-7591

Description

A security flaw has been discovered in TimBroddin astro-mcp-server up to 1.1.1. The impacted element is an unknown function of the file src/index.ts of the component MCP Tool Query Construction. Performing a manipulation of the argument request.params.arguments results in sql injection. The attack may be initiated remotely. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

SQL injection in TimBroddin/astro-mcp-server ≤1.1.1 allows remote attackers to manipulate SQLite queries via MCP tool parameters, with public exploit available.

Vulnerability

Details

CVE-2026-7591 describes an SQL injection vulnerability in the TimBroddin/astro-mcp-server project, affecting versions up to 1.1.1. The flaw resides in src/index.ts, where multiple MCP tools—such as search_rankings—accept user-controlled parameters (e.g., keyword, store, appName, appId) and directly interpolate them into SQLite query strings executed by db.exec() without proper sanitization [1][2]. This constitutes a classic CWE-89 (Improper Neutralization of Special Elements used in an SQL Command) [2].

Exploitation

An attacker with network access to the MCP interface can craft malicious values for these parameters and send them to any of the affected tools. The attack is remotely exploitable and does not require authentication [2]. The vulnerability was reported via a GitHub issue on April 14, 2026, and a public exploit has since been released [2].

Impact

Successful exploitation allows the attacker to bypass intended filters, extract arbitrary data from the local Astro ASO database, and alter query semantics. This could lead to unauthorized disclosure of app ranking data, keyword trends, and other sensitive information stored in the SQLite database [2].

Mitigation

As of the publication date, no fixed version has been released. The project maintainer was informed through an issue report but has not responded [2]. Users are advised to restrict network access to the MCP server, disable the service if not required, or implement a reverse proxy with input validation until a patch becomes available.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.