Vulnerability Description
mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions prior to 0.6.0, the read_only mode enforcement can be bypassed using APOC CALL procedures, potentially allowing unauthorized write operations or server-side request forgery. This issue is fixed in version 0.6.0.
Related Weaknesses (CWE)
References
- https://github.com/neo4j-contrib/mcp-neo4j/releases/tag/mcp-neo4j-cypher-v0.6.0
- https://github.com/neo4j-contrib/mcp-neo4j/security/advisories/GHSA-x3cv-r3g3-fp
FAQ
What is CVE-2026-35402?
CVE-2026-35402 is a documented vulnerability. mcp-neo4j-cypher is an MCP server for executing Cypher queries against Neo4j databases. In versions prior to 0.6.0, the read_only mode enforcement can be bypassed using APOC CALL procedures, potential...
How severe is CVE-2026-35402?
CVSS scoring is not yet available for CVE-2026-35402. Check NVD for updates.
Is there a patch for CVE-2026-35402?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.