Description
A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The name of the patch is 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. It is best practice to apply a patch to resolve this issue.
Published: 2026-02-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery
Action: Apply Patch
AI Analysis

Impact

A flaw in MindsDB’s clear_filename function used during file uploads allows an attacker to craft requests that the server will forward to other systems. This server‑side request forgery can expose internal services, potentially enabling unauthorized data access or further lateral movement inside the network. The vulnerability is rooted in improper validation of outbound requests (CWE‑918).

Affected Systems

MindsDB installations up to version 25.14.1 are affected. The flaw exists in the file mindsdb/utilities/security.py of the File Upload component. No other versions or product lines are listed as vulnerable.

Risk and Exploitability

The CVSS score of 5.3 indicates medium severity, and the EPSS score of less than 1 % suggests a low probability of current exploitation. The vulnerability is publicly disclosed, can be triggered from remote systems, and is not yet listed in the CISA KEV catalog. Attackers with network access to the MindsDB instance could exploit the flaw to send arbitrary HTTP requests, which may lead to disclosure of sensitive data or additional compromise actions.

Generated by OpenCVE AI on April 17, 2026 at 19:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MindsDB or apply the patch corresponding to commit 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed to address the clear_filename flaw
  • If file upload functionality is not required, disable or remove it from the deployment configuration to eliminate the attack surface
  • Implement network-level controls such as firewall rules or reverse proxy restrictions to block outbound requests from the MindsDB service to internal IP ranges, mitigating potential SSRF exploitation

Generated by OpenCVE AI on April 17, 2026 at 19:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-6xw9-2p64-7622 MindsDB affected by a SSRF vulnerability
History

Thu, 19 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*

Tue, 17 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Mindsdb
Mindsdb mindsdb
Vendors & Products Mindsdb
Mindsdb mindsdb

Mon, 16 Feb 2026 03:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The name of the patch is 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. It is best practice to apply a patch to resolve this issue.
Title MindsDB File Upload security.py clear_filename server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T10:04:42.310Z

Reserved: 2026-02-15T09:04:25.876Z

Link: CVE-2026-2531

cve-icon Vulnrichment

Updated: 2026-02-17T17:09:55.453Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-16T04:15:51.897

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-2531

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T19:30:15Z

Weaknesses