Medium severity6.3NVD Advisory· Published Feb 16, 2026· Updated Apr 29, 2026
CVE-2026-2531
CVE-2026-2531
Description
A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The name of the patch is 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. It is best practice to apply a patch to resolve this issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
MindsDBPyPI | <= 25.14.1 | — |
Affected products
1Patches
174d6f0fd4b63Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
8- github.com/mindsdb/mindsdb/pull/12213nvdIssue TrackingPatchWEB
- github.com/themavik/mindsdb/commit/74d6f0fd4b630218519a700fbee1c05c7fd4b1ednvdPatchWEB
- github.com/mindsdb/mindsdb/issues/12163nvdExploitIssue TrackingThird Party AdvisoryWEB
- github.com/advisories/GHSA-6xw9-2p64-7622ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-2531ghsaADVISORY
- vuldb.comnvdThird Party AdvisoryVDB EntryWEB
- vuldb.comnvdThird Party AdvisoryVDB EntryWEB
- vuldb.comnvdPermissions RequiredVDB EntryWEB
News mentions
0No linked articles in our index yet.