Advisories for Golang/Github.com/Tencent/WeKnora package

2026

WeKnora vulnerable to SQL Injection

After WeKnora enables the Agent service, it allows users to call the database query tool. Due to insufficient backend validation, an attacker can use prompt‑based bypass techniques to evade query restrictions and obtain sensitive information from the target server and database.

WeKnora has Command Injection in MCP stdio test

Remote Code Execution (RCE): Arbitrary command execution enables file creation/modification, execution of additional payloads, and service disruption Information Disclosure: Sensitive data exfiltration through reading environment variables, configuration files, keys, tokens, and local files Privilege Escalation/Lateral Movement (Environment-Dependent): Impact may escalate based on container mounts, network policies, and internal service access permissions Cross-Tenant Boundary Impact: Execution occurs in a shared backend runtime; depending on deployment configuration, impact may extend beyond tenant …

WeKnora has Command Injection in MCP stdio test

Remote Code Execution (RCE): Arbitrary command execution enables file creation/modification, execution of additional payloads, and service disruption Information Disclosure: Sensitive data exfiltration through reading environment variables, configuration files, keys, tokens, and local files Privilege Escalation/Lateral Movement (Environment-Dependent): Impact may escalate based on container mounts, network policies, and internal service access permissions Cross-Tenant Boundary Impact: Execution occurs in a shared backend runtime; depending on deployment configuration, impact may extend beyond tenant …