CVE-2026-35402
mcp-neo4j-cypher: SSRF and Data Modification via read_only Mode Bypass Through CALL Procedures
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions prior to 0.6.0, the read_only mode enforcement can be bypassed using APOC CALL procedures, potentially allowing unauthorized write operations or server-side request forgery. This issue is fixed in version 0.6.0.
| CWE | CWE-284 |
| Vendor | neo4j-contrib |
| Product | mcp-neo4j |
| Published | Apr 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for neo4j-contrib mcp-neo4j
Be the first to know when new unknown vulnerabilities affecting neo4j-contrib mcp-neo4j are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
neo4j-contrib / mcp-neo4j
< 0.6.0