CVE-2026-35402 PUBLISHED

mcp-neo4j-cypher: SSRF and Data Modification via read_only Mode Bypass Through CALL Procedures

Assigner: GitHub_M
Reserved: 02.04.2026 Published: 17.04.2026 Updated: 17.04.2026

mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions prior to 0.6.0, the read_only mode enforcement can be bypassed using APOC CALL procedures, potentially allowing unauthorized write operations or server-side request forgery. This issue is fixed in version 0.6.0.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
CVSS Score: 2.3

Product Status

Vendor neo4j-contrib
Product mcp-neo4j
Versions
  • Version < 0.6.0 is affected

References

Problem Types

  • CWE-284: Improper Access Control CWE