CVE-2026-35228
Published: 05 May 2026
Summary
CVE-2026-35228 is a high-severity SQL Injection (CWE-89) vulnerability in Oracle MCP Server (inferred from references). Its CVSS base score is 8.7 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 22.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the Protocol-Specific Risks risk domain.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents SQL injection vulnerabilities like CVE-2026-35228 by requiring validation of all information inputs to block malicious SQL execution.
Ensures timely identification, reporting, and remediation of flaws such as this SQL injection vulnerability in the Oracle MCP Server Helper Tool.
Provides vulnerability scanning and monitoring to identify and prioritize SQL injection issues like CVE-2026-35228 for remediation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a network-accessible HTTP helper tool directly enables T1190 (Exploit Public-Facing Application) for initial compromise and data access/manipulation.
NVD Description
Vulnerability in the Oracle MCP Server Helper Tool product of Oracle Open Source Projects (component: helper tool). The supported versions that is affected is 1.0.1-1.0.156. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle MCP…
more
Server Helper Tool. Successful attacks of this vulnerability can result in Oracle MCP Server Helper Tool executing malicious SQL.
Deeper analysisAI
CVE-2026-35228 is a vulnerability in the Oracle MCP Server Helper Tool product of Oracle Open Source Projects, specifically affecting the helper tool component. The supported versions impacted are 1.0.1 through 1.0.156. This is an SQL injection issue (CWE-89), published on 2026-05-05, with a CVSS v3.1 base score of 8.7 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N).
An easily exploitable vulnerability allows an unauthenticated attacker with network access via HTTP to compromise the Oracle MCP Server Helper Tool. Exploitation requires low privileges and user interaction but has low attack complexity over the network. Successful attacks result in the tool executing malicious SQL, enabling high impacts to confidentiality and integrity with a changed scope.
Mitigation details are available in the Oracle security advisory at https://www.oracle.com/security-alerts/all-oracle-cves-outside-other-oracle-public-documents.html.
Details
- CWE(s)
Affected Products
AI Security AnalysisAI
- AI Category
- AI Agent Protocols and Integrations
- Risk Domain
- Protocol-Specific Risks
- OWASP Top 10 for LLMs 2025
- None mapped
- Classification Reason
- Matched keywords: mcp, mcp, mcp