CWE-433

Unparsed Raw Web Content Delivery

The product stores raw content or supporting code under the web document root with an extension that is not specifically handled by the server.

CVE-2026-31841 (GCVE-0-2026-31841)

Vulnerability from cvelistv5 – Published: 2026-03-12 17:03 – Updated: 2026-03-12 17:50
VLAI?
Title
Raw exposure of database statements in Hyperterse MCP search tool
Summary
Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces from declarative config. Prior to v2.2.0, the search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly. This issue has been fixed as of v2.2.0.
CWE
  • CWE-433 - Unparsed Raw Web Content Delivery
Assigner
Impacted products
Vendor Product Version
hyperterse hyperterse Affected: >= 2.0.0, < 2.2.0
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2026-31841",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2026-03-12T17:50:05.033697Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2026-03-12T17:50:15.398Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "hyperterse",
          "vendor": "hyperterse",
          "versions": [
            {
              "status": "affected",
              "version": "\u003e= 2.0.0, \u003c 2.2.0"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces from declarative config. Prior to v2.2.0, the search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly. This issue has been fixed as of v2.2.0."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-433",
              "description": "CWE-433: Unparsed Raw Web Content Delivery",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-03-12T17:03:32.818Z",
        "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
        "shortName": "GitHub_M"
      },
      "references": [
        {
          "name": "https://github.com/hyperterse/hyperterse/security/advisories/GHSA-92gp-jfgx-9qpv",
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/hyperterse/hyperterse/security/advisories/GHSA-92gp-jfgx-9qpv"
        },
        {
          "name": "https://github.com/hyperterse/hyperterse/releases/tag/v2.2.0",
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/hyperterse/hyperterse/releases/tag/v2.2.0"
        }
      ],
      "source": {
        "advisory": "GHSA-92gp-jfgx-9qpv",
        "discovery": "UNKNOWN"
      },
      "title": "Raw exposure of database statements in Hyperterse MCP search tool"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
    "assignerShortName": "GitHub_M",
    "cveId": "CVE-2026-31841",
    "datePublished": "2026-03-12T17:03:32.818Z",
    "dateReserved": "2026-03-09T17:41:56.078Z",
    "dateUpdated": "2026-03-12T17:50:15.398Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}


Mitigation

Phase: Architecture and Design

Description:

  • Perform a type check before interpreting files.
Mitigation

Phase: Architecture and Design

Description:

  • Do not store sensitive information in files which may be misinterpreted.

No CAPEC attack patterns related to this CWE.

Back to CWE stats page