CVE-2026-2531

A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The name of the patch is 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. It is best practice to apply a patch to resolve this issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*

History

19 Feb 2026, 19:47

Type Values Removed Values Added
CPE cpe:2.3:a:mindsdb:mindsdb:*:*:*:*:*:*:*:*
First Time Mindsdb mindsdb
Mindsdb
References () https://github.com/mindsdb/mindsdb/ - () https://github.com/mindsdb/mindsdb/ - Product
References () https://github.com/mindsdb/mindsdb/issues/12163 - () https://github.com/mindsdb/mindsdb/issues/12163 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/mindsdb/mindsdb/pull/12213 - () https://github.com/mindsdb/mindsdb/pull/12213 - Issue Tracking, Patch
References () https://github.com/themavik/mindsdb/commit/74d6f0fd4b630218519a700fbee1c05c7fd4b1ed - () https://github.com/themavik/mindsdb/commit/74d6f0fd4b630218519a700fbee1c05c7fd4b1ed - Patch
References () https://vuldb.com/?ctiid.346119 - () https://vuldb.com/?ctiid.346119 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.346119 - () https://vuldb.com/?id.346119 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.748219 - () https://vuldb.com/?submit.748219 - Third Party Advisory, VDB Entry

18 Feb 2026, 17:52

Type Values Removed Values Added
Summary
  • (es) Se ha detectado una vulnerabilidad de seguridad en MindsDB hasta la versión 25.14.1. Esta vulnerabilidad afecta a la función clear_filename del archivo mindsdb/utilities/security.py del componente Carga de Archivos. Dicha manipulación conduce a una falsificación de petición del lado del servidor. El ataque puede realizarse de forma remota. El exploit ha sido divulgado públicamente y puede ser utilizado. El nombre del parche es 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. Es una buena práctica aplicar un parche para resolver este problema.

16 Feb 2026, 04:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-16 04:15

Updated : 2026-02-19 19:47


NVD link : CVE-2026-2531

Mitre link : CVE-2026-2531

CVE.ORG link : CVE-2026-2531


JSON object : View

Products Affected

mindsdb

  • mindsdb
CWE
CWE-918

Server-Side Request Forgery (SSRF)