Description
A vulnerability was identified in rethinkdb up to 2.4.3. Affected by this issue is some unknown functionality of the component Secondary Index Handler. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-28
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross-Site Scripting
Action: Assess
AI Analysis

Impact

The identified flaw is a cross‑site scripting vulnerability within the Secondary Index Handler of RethinkDB. Manipulation of the index metadata allows an attacker to inject arbitrary script code that is then returned to users who retrieve the affected metadata. The vulnerability can lead to the execution of malicious scripts in the browsers of legitimate users, potentially compromising the confidentiality and integrity of data transmitted by those browsers. This weakness is classified as CWE-79 and CWE-94.

Affected Systems

All deployments of RethinkDB versions 2.4.3 and earlier are impacted. The flaw resides in the component that handles secondary index operations and therefore affects any installation that uses secondary indexes. No specific operating system or environment constraints are provided, so the risk applies broadly to all supported platforms for those product versions.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate severity, while the EPSS score of less than 1% suggests that exploitation has not been widely observed. A publicly available proof‑of‑concept demonstrates that the attack can be carried out remotely without authentication. Although the vulnerability is not currently listed in the CISA KEV catalog, the presence of a remote exploit and the lack of an official patch mean that deployments should be monitored, and remediation should be prioritized if a fix becomes available.

Generated by OpenCVE AI on April 18, 2026 at 14:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade RethinkDB to a version newer than 2.4.3 when it becomes available.
  • If an upgrade is not feasible, disable secondary index functionality or restrict access to the database server from trusted hosts only.
  • Implement output sanitization or a web application firewall to mitigate script injection that may originate from secondary index data.

Generated by OpenCVE AI on April 18, 2026 at 14:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Rethinkdb
Rethinkdb rethinkdb
Vendors & Products Rethinkdb
Rethinkdb rethinkdb

Wed, 28 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 15:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in rethinkdb up to 2.4.3. Affected by this issue is some unknown functionality of the component Secondary Index Handler. Such manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title rethinkdb Secondary Index cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Rethinkdb Rethinkdb
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:00:04.097Z

Reserved: 2026-01-28T10:08:12.406Z

Link: CVE-2026-1520

cve-icon Vulnrichment

Updated: 2026-01-28T16:27:33.691Z

cve-icon NVD

Status : Deferred

Published: 2026-01-28T15:16:17.303

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1520

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses