CVE-2026-2531

MEDIUM

MindsDB <25.14.1 - SSRF

Title source: llm
STIX 2.1

Description

A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The name of the patch is 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. It is best practice to apply a patch to resolve this issue.

References (7)

Core 7
Core References
Permissions Required, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.346119
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.346119
Permissions Required, VDB Entry third-party-advisory
https://vuldb.com/?submit.748219
Issue Tracking exploit issue-tracking
https://github.com/mindsdb/mindsdb/issues/12163
Issue Tracking issue-tracking
https://github.com/mindsdb/mindsdb/pull/12213
Various Sources product
https://github.com/mindsdb/mindsdb/

Scores

CVSS v3 6.3
EPSS 0.0008
EPSS Percentile 23.1%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-918
Status published
Products (2)
mindsdb/mindsdb < 25.14.1
pypi/MindsDB 0PyPI
Published Feb 16, 2026
Tracked Since Feb 18, 2026