Impact
A flaw in MindsDB’s clear_filename function used during file uploads allows an attacker to craft requests that the server will forward to other systems. This server‑side request forgery can expose internal services, potentially enabling unauthorized data access or further lateral movement inside the network. The vulnerability is rooted in improper validation of outbound requests (CWE‑918).
Affected Systems
MindsDB installations up to version 25.14.1 are affected. The flaw exists in the file mindsdb/utilities/security.py of the File Upload component. No other versions or product lines are listed as vulnerable.
Risk and Exploitability
The CVSS score of 5.3 indicates medium severity, and the EPSS score of less than 1 % suggests a low probability of current exploitation. The vulnerability is publicly disclosed, can be triggered from remote systems, and is not yet listed in the CISA KEV catalog. Attackers with network access to the MindsDB instance could exploit the flaw to send arbitrary HTTP requests, which may lead to disclosure of sensitive data or additional compromise actions.
OpenCVE Enrichment
Github GHSA