VYPR
High severity8.8GHSA Advisory· Published May 6, 2026· Updated May 11, 2026

CVE-2026-29090

CVE-2026-29090

Description

Summary

A SQL injection vulnerability exists in Rucio versions 1.30.0 and later before 35.8.5, 38.5.5, 39.4.2, and 40.1.1, in FilterEngine.create_postgres_query(). This allows any authenticated Rucio user to execute arbitrary SQL against the PostgreSQL metadata database through the DID search endpoint (GET /dids/<scope>/dids/search). When the postgres_meta metadata plugin is configured, attacker-controlled filter keys and values are interpolated directly into raw SQL strings via Python .format(), then passed to psycopg3's sql.SQL() which treats the string as trusted SQL syntax.

Depending on the database privileges assigned to the service account, exploitation can expose sensitive tables, modify or delete metadata, access server-side files, or achieve code execution through PostgreSQL features such as COPY ... FROM PROGRAM. This issue affects deployments that explicitly use the postgres_meta metadata plugin. This vulnerability has been fixed in versions 35.8.5, 38.5.5, 39.4.2, and 40.1.1.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
rucioPyPI
>= 1.30.0, < 35.8.535.8.5
rucioPyPI
>= 36.0.0, < 38.5.538.5.5
rucioPyPI
>= 39.0.0, < 39.4.239.4.2
rucioPyPI
>= 40.0.0, < 40.1.140.1.1

Affected products

2
  • Range: >= 40.0.0, < 40.1.1
  • cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*
    Range: >=1.30.0,<35.8.5

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.