Description
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in rethinkdb (src/cjson modules). This vulnerability is associated with program files cJSON.Cc.

This issue affects rethinkdb: through v2.4.4.
Published: 2026-01-27
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

A classic buffer overflow exists in the cJSON parsing component of RethinkDB. The flaw allows an attacker to supply an input payload larger than the destination buffer, causing an overwrite of adjacent memory. If successfully exploited, this could lead to arbitrary code execution under the privileges of the RethinkDB process, impacting confidentiality, integrity, and availability. The weakness is identified as CWE‑120.

Affected Systems

The vulnerability is present in all publicly released versions of RethinkDB up to and including 2.4.4. RethinkDB is an open‑source distributed database system that typically runs as a server process listening on network ports. Users who maintain a RethinkDB cluster must ensure they are not running any of the affected releases.

Risk and Exploitability

The CVSS score of 10 marks it as critical, yet its EPSS of less than 1% suggests that exploit activity is very uncommon at present. It is not listed in the CISA KEV catalog, so there is no immediate evidence of active exploitation. Nonetheless, because the flaw can potentially enable remote code execution through malicious JSON payloads sent over the network, the attack vector is likely remote. Administrators should treat it as a high‑risk vulnerability that warrants prompt remediation.

Generated by OpenCVE AI on April 18, 2026 at 14:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to RethinkDB 2.4.5 or later, which contains a patch for the cJSON buffer overflow.
  • If an upgrade cannot be applied immediately, restrict network access to the RethinkDB service by applying firewall rules that allow traffic only from trusted hosts.
  • Monitor inbound traffic for unusually large JSON payloads and configure alerts for oversized requests, which may indicate exploitation attempts.

Generated by OpenCVE AI on April 18, 2026 at 14:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 27 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Rethinkdb
Rethinkdb rethinkdb
Vendors & Products Rethinkdb
Rethinkdb rethinkdb

Tue, 27 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 27 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
Description Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in rethinkdb (src/cjson modules). This vulnerability is associated with program files cJSON.Cc. This issue affects rethinkdb: through v2.4.4.
Title A buffer overflow in rethinkdb/rethinkdb
Weaknesses CWE-120
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:U/V:C/RE:M/U:Red'}


Subscriptions

Rethinkdb Rethinkdb
cve-icon MITRE

Status: PUBLISHED

Assigner: GovTech CSG

Published:

Updated: 2026-01-27T15:25:58.557Z

Reserved: 2026-01-27T08:39:10.281Z

Link: CVE-2026-24810

cve-icon Vulnrichment

Updated: 2026-01-27T15:25:51.787Z

cve-icon NVD

Status : Deferred

Published: 2026-01-27T09:15:51.300

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-24810

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T15:00:03Z

Weaknesses