No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dubydu
Dubydu sqlite-mcp |
|
| Vendors & Products |
Dubydu
Dubydu sqlite-mcp |
Tue, 28 Apr 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security flaw has been discovered in dubydu sqlite-mcp up to 0.1.0. The affected element is the function extract_to_json of the file src/entry.py. Performing a manipulation of the argument output_filename results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The patch is named a5580cb992f4f6c308c9ffe6442b2e76709db548. Applying a patch is the recommended action to fix this issue. | |
| Title | dubydu sqlite-mcp entry.py extract_to_json sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-28T00:45:12.532Z
Reserved: 2026-04-27T14:05:13.793Z
Link: CVE-2026-7206
No data.
Status : Received
Published: 2026-04-28T01:16:02.150
Modified: 2026-04-28T01:16:02.150
Link: CVE-2026-7206
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:16:36Z