Hyperterse is a tool-first MCP framework for building AI-ready backend surfaces from declarative config. Prior to v2.2.0, the search tool allows LLMs to search for tools using natural language. While returning results, Hyperterse also returned the raw SQL queries, exposing statements which were supposed to be executed under the hood, and protected from being displayed publicly. This issue has been fixed as of v2.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/hyperterse/hyperterse/releases/tag/v2.2.0 | Product Release Notes |
| https://github.com/hyperterse/hyperterse/security/advisories/GHSA-92gp-jfgx-9qpv | Patch Vendor Advisory |
Configurations
History
19 Mar 2026, 17:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Hyperterse
Hyperterse hyperterse |
|
| CPE | cpe:2.3:a:hyperterse:hyperterse:*:*:*:*:*:*:*:* | |
| References | () https://github.com/hyperterse/hyperterse/releases/tag/v2.2.0 - Product, Release Notes | |
| References | () https://github.com/hyperterse/hyperterse/security/advisories/GHSA-92gp-jfgx-9qpv - Patch, Vendor Advisory | |
| Summary |
|
12 Mar 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-12 17:16
Updated : 2026-03-19 17:35
NVD link : CVE-2026-31841
Mitre link : CVE-2026-31841
CVE.ORG link : CVE-2026-31841
JSON object : View
Products Affected
hyperterse
- hyperterse
CWE
CWE-433
Unparsed Raw Web Content Delivery
