Cyber Posture

CVE-2026-7206

High

Published: 28 April 2026

Published
28 April 2026
Modified
29 April 2026
KEV Added
Patch
CVSS Score 7.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0004 13.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-7206 is a high-severity Injection (CWE-74) vulnerability. Its CVSS base score is 7.3 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

This vulnerability is AI-related — categorised as AI Agent Protocols and Integrations; in the Protocol-Specific Risks risk domain.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring timely patching of the SQL injection flaw in extract_to_json as recommended in the advisory.

prevent

Prevents SQL injection exploitation by validating the manipulated output_filename argument before processing.

detect

Identifies the SQL injection vulnerability in sqlite-mcp through regular scanning for known CVEs like CVE-2026-7206.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The remote SQL injection vulnerability in a network-accessible component with no authentication required directly enables exploitation of public-facing applications for initial access and limited data manipulation.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A security flaw has been discovered in dubydu sqlite-mcp up to 0.1.0. The affected element is the function extract_to_json of the file src/entry.py. Performing a manipulation of the argument output_filename results in sql injection. Remote exploitation of the attack is…

more

possible. The exploit has been released to the public and may be used for attacks. The patch is named a5580cb992f4f6c308c9ffe6442b2e76709db548. Applying a patch is the recommended action to fix this issue.

Deeper analysisAI

CVE-2026-7206 is a SQL injection vulnerability (CWE-74, CWE-89) affecting dubydu sqlite-mcp versions up to 0.1.0. The issue lies in the extract_to_json function within the src/entry.py file, where manipulation of the output_filename argument enables injection of malicious SQL code. Published on 2026-04-28, it carries a CVSS v3.1 base score of 7.3 (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L), indicating high severity due to its network accessibility and lack of prerequisites.

Remote attackers require no privileges or user interaction to exploit this flaw over the network with low attack complexity. Exploitation allows limited impacts on confidentiality, integrity, and availability, potentially enabling unauthorized data access, modification, or disruption via injected SQL commands. A public exploit has been released, increasing the risk of active attacks.

Mitigation involves applying the patch commit a5580cb992f4f6c308c9ffe6442b2e76709db548 from the project's GitHub repository, as recommended in the advisory. Additional details are available in the related GitHub issue, pull request, and VulDB submission.

Details

CWE(s)

AI Security AnalysisAI

AI Category
AI Agent Protocols and Integrations
Risk Domain
Protocol-Specific Risks
OWASP Top 10 for LLMs 2025
None mapped
Classification Reason
Matched keywords: mcp

CVEs Like This One

CVE-2026-5322Shared CWE-74, CWE-89
CVE-2026-4844Shared CWE-74, CWE-89
CVE-2025-0698Shared CWE-74, CWE-89
CVE-2026-3790Shared CWE-74, CWE-89
CVE-2026-5813Shared CWE-74, CWE-89
CVE-2026-3406Shared CWE-74, CWE-89
CVE-2026-3151Shared CWE-74, CWE-89
CVE-2025-1809Shared CWE-74, CWE-89
CVE-2025-1464Shared CWE-74, CWE-89
CVE-2026-6189Shared CWE-74, CWE-89

References