๐Ÿ” CVE Alert

CVE-2026-35402

UNKNOWN 0.0

mcp-neo4j-cypher: SSRF and Data Modification via read_only Mode Bypass Through CALL Procedures

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions prior to 0.6.0, the read_only mode enforcement can be bypassed using APOC CALL procedures, potentially allowing unauthorized write operations or server-side request forgery. This issue is fixed in version 0.6.0.

CWE CWE-284
Vendor neo4j-contrib
Product mcp-neo4j
Published Apr 17, 2026
Stay Ahead of the Next One

Get instant alerts for neo4j-contrib mcp-neo4j

Be the first to know when new unknown vulnerabilities affecting neo4j-contrib mcp-neo4j are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

neo4j-contrib / mcp-neo4j
< 0.6.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/neo4j-contrib/mcp-neo4j/security/advisories/GHSA-x3cv-r3g3-fpg9 github.com: https://github.com/neo4j-contrib/mcp-neo4j/releases/tag/mcp-neo4j-cypher-v0.6.0