Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x3cv-r3g3-fpg9 | Neo4j Labs MCP Servers: SSRF and Data Modification via read_only Mode Bypass Through CALL Procedures |
Tue, 21 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Neo4j-contrib
Neo4j-contrib mcp-neo4j |
|
| Vendors & Products |
Neo4j-contrib
Neo4j-contrib mcp-neo4j |
Fri, 17 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions prior to 0.6.0, the read_only mode enforcement can be bypassed using APOC CALL procedures, potentially allowing unauthorized write operations or server-side request forgery. This issue is fixed in version 0.6.0. | |
| Title | mcp-neo4j-cypher: SSRF and Data Modification via read_only Mode Bypass Through CALL Procedures | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-20T15:51:06.164Z
Reserved: 2026-04-02T17:03:42.074Z
Link: CVE-2026-35402
Updated: 2026-04-20T15:51:01.202Z
Status : Deferred
Published: 2026-04-17T21:16:33.170
Modified: 2026-04-29T21:04:10.060
Link: CVE-2026-35402
No data.
OpenCVE Enrichment
Updated: 2026-04-18T09:00:05Z
Github GHSA