Neo4j Labs MCP Servers: SSRF and Data Modification via read_only Mode Bypass Through CALL Procedures
Low severity
GitHub Reviewed
Published
Apr 17, 2026
in
neo4j-contrib/mcp-neo4j
•
Updated Apr 17, 2026
Description
Published to the GitHub Advisory Database
Apr 17, 2026
Reviewed
Apr 17, 2026
Last updated
Apr 17, 2026
Summary
The
read_onlymode inmcp-neo4j-cypherversions prior to 0.6.0 can be bypassed usingCALLprocedures.Details
Impact
The enforcing of
read_onlymode in vulnerable versions could be bypassed by certain APOC procedures.Patches
v0.6.0 release hardened the checks around the mode. The only way to guarantee the server actions is to limit the permissions of the db credentials available to the server.
Notes
Impacts for server-side request forgery vulnerabilities may depend on both the configuration of the vulnerable system as well as the presence of other systems in the environment that could be accessed as part of exploitation.
Recommended hardening
apoc.import.file.enabledisfalseby defaultapoc.import.file.use_neo4j_configistrueby default to restrict file imports to the import folderCredits
We want to publicly recognise the contribution of Yotam Perkal from Pluto Security.
References