← Back to CVEs
CVE-2026-2531
MEDIUM6.3
Description
A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The name of the patch is 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. It is best practice to apply a patch to resolve this issue.
CVE Details
CVSS v3.1 Score6.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published2/16/2026
Last Modified2/19/2026
Sourcenvd
Honeypot Sightings0
Affected Products
mindsdb:mindsdb
Weaknesses (CWE)
CWE-918
References
https://github.com/mindsdb/mindsdb/(cna@vuldb.com)
https://github.com/mindsdb/mindsdb/issues/12163(cna@vuldb.com)
https://github.com/mindsdb/mindsdb/pull/12213(cna@vuldb.com)
https://vuldb.com/?ctiid.346119(cna@vuldb.com)
https://vuldb.com/?id.346119(cna@vuldb.com)
https://vuldb.com/?submit.748219(cna@vuldb.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.