mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions prior to 0.6.0, the read_only mode enforcement can be bypassed using APOC CALL procedures, potentially allowing unauthorized write operations or server-side request forgery. This issue is fixed in version 0.6.0.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-x3cv-r3g3-fpg9 | Neo4j Labs MCP Servers: SSRF and Data Modification via read_only Mode Bypass Through CALL Procedures |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 17 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Neo4j-contrib
Neo4j-contrib mcp-neo4j |
|
| Vendors & Products |
Neo4j-contrib
Neo4j-contrib mcp-neo4j |
Fri, 17 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions prior to 0.6.0, the read_only mode enforcement can be bypassed using APOC CALL procedures, potentially allowing unauthorized write operations or server-side request forgery. This issue is fixed in version 0.6.0. | |
| Title | mcp-neo4j-cypher: SSRF and Data Modification via read_only Mode Bypass Through CALL Procedures | |
| Weaknesses | CWE-284 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-17T20:34:06.510Z
Reserved: 2026-04-02T17:03:42.074Z
Link: CVE-2026-35402
No data.
Status : Received
Published: 2026-04-17T21:16:33.170
Modified: 2026-04-17T21:16:33.170
Link: CVE-2026-35402
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:30:28Z
Weaknesses
Github GHSA