CVE-2025-59333

8.1 HIGH

📋 TL;DR

The mcp-database-server fails to properly enforce read-only mode, allowing attackers to execute unauthorized database operations. This affects users of the npm package @executeautomation/database-server version 1.1.0 and earlier. Attackers could modify or delete data, potentially causing denial of service.

💻 Affected Systems

Products:
  • mcp-database-server
  • @executeautomation/database-server
Versions: 1.1.0 and earlier
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects npm distribution; other distributions are not impacted. Requires read-only mode to be configured and used.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data deletion, privilege escalation, and persistent backdoor installation leading to system takeover.

🟠

Likely Case

Unauthorized data modification, denial of service through resource exhaustion, and potential data exfiltration from affected databases.

🟢

If Mitigated

Limited impact with proper network segmentation and database permissions, though read-only mode would still be bypassed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the server interface and knowledge of database operations that should be restricted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.1 or later

Vendor Advisory: https://github.com/executeautomation/mcp-database-server/security/advisories/GHSA-65hm-pwj5-73pw

Restart Required: Yes

Instructions:

1. Update npm package: npm update @executeautomation/database-server
2. Verify version is 1.1.1 or higher
3. Restart the mcp-database-server service

🔧 Temporary Workarounds

Disable read-only mode

all

Remove read-only configuration to eliminate the vulnerability surface

Modify server configuration to remove read-only mode settings

Network isolation

all

Restrict access to the database server interface

Configure firewall rules to limit access to trusted IPs only

🧯 If You Can't Patch

  • Implement strict database user permissions with minimal privileges
  • Deploy network segmentation and restrict server access to essential services only

🔍 How to Verify

Check if Vulnerable:

Check package.json for @executeautomation/database-server version 1.1.0 or earlier

Check Version:

npm list @executeautomation/database-server

Verify Fix Applied:

Verify package version is 1.1.1 or later and test read-only mode enforcement

📡 Detection & Monitoring

Log Indicators:

  • Unexpected write operations in read-only mode
  • Database permission errors
  • Unusual query patterns

Network Indicators:

  • Unusual database traffic from mcp-database-server
  • Write operations during read-only sessions

SIEM Query:

source="mcp-database-server" AND (event_type="write" OR operation="INSERT" OR operation="UPDATE" OR operation="DELETE")

🔗 References

📤 Share & Export