CVE-2026-35402
LOWmcp-neo4j-cypher: SSRF and Data Modification via read_only Mode Bypass Through CALL Procedures
Title source: cnaDescription
mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions prior to 0.6.0, the read_only mode enforcement can be bypassed using APOC CALL procedures, potentially allowing unauthorized write operations or server-side request forgery. This issue is fixed in version 0.6.0.
Scores
CVSS v4
2.3
EPSS
0.0004
EPSS Percentile
13.0%
CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-284
Status
published
Products (2)
neo4j-contrib/mcp-neo4j
< 0.6.0
pypi/mcp-neo4j-cypher
0 - 0.6.0PyPI
Published
Apr 17, 2026
Tracked Since
Apr 18, 2026