Vulnerability Description
Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Versions prior to 35.8.3, 38.5.4, and 39.3.1 have a stored Cross-Site Scripting (XSS) vulnerability in the Identity Name of the WebUI where attacker-controlled input is persisted by the backend and later rendered in the WebUI without proper output encoding. This allows arbitrary JavaScript execution in the context of the WebUI for users who view affected pages, potentially enabling session token theft or unauthorized actions. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cern | Rucio | < 35.8.3 |
Related Weaknesses (CWE)
References
- https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_CNot Applicable
- https://github.com/rucio/rucio/releases/tag/35.8.3ProductRelease Notes
- https://github.com/rucio/rucio/releases/tag/38.5.4ProductRelease Notes
- https://github.com/rucio/rucio/releases/tag/39.3.1ProductRelease Notes
- https://github.com/rucio/rucio/security/advisories/GHSA-8wpv-6x3f-3rm5ExploitVendor Advisory
- https://github.com/rucio/rucio/security/advisories/GHSA-8wpv-6x3f-3rm5ExploitVendor Advisory
FAQ
What is CVE-2026-25735?
CVE-2026-25735 is a vulnerability with a CVSS score of 6.1 (MEDIUM). Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Versions prior to 35.8.3, 38.5.4, and 39.3.1 hav...
How severe is CVE-2026-25735?
CVE-2026-25735 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-25735?
Check the references section above for vendor advisories and patch information. Affected products include: Cern Rucio.