Home

Description

A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The name of the patch is 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. It is best practice to apply a patch to resolve this issue.

PUBLISHED Reserved 2026-02-15 | Published 2026-02-16 | Updated 2026-02-23 | Assigner VulDB




MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 6.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
MEDIUM: 6.3CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
6.5AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:OF/RC:C

Problem types

Server-Side Request Forgery

Timeline

2026-02-15:Advisory disclosed
2026-02-15:VulDB entry created
2026-02-20:VulDB entry last update

Credits

fushuling (VulDB User) reporter

References

vuldb.com/?id.346119 (VDB-346119 | MindsDB File Upload security.py clear_filename server-side request forgery) vdb-entry technical-description

vuldb.com/?ctiid.346119 (VDB-346119 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.748219 (Submit #748219 | mindsdb v25.14.1 SSRF) third-party-advisory

github.com/mindsdb/mindsdb/issues/12163 exploit issue-tracking

github.com/mindsdb/mindsdb/pull/12213 issue-tracking

github.com/...ommit/74d6f0fd4b630218519a700fbee1c05c7fd4b1ed patch

github.com/mindsdb/mindsdb/ product

cve.org (CVE-2026-2531)

nvd.nist.gov (CVE-2026-2531)

Download JSON