Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Versions prior to 35.8.3, 38.5.4, and 39.3.1 have a stored Cross-Site Scripting (XSS) vulnerability in the Custom Rules function of the WebUI where attacker-controlled input is persisted by the backend and later rendered in the WebUI without proper output encoding. This allows arbitrary JavaScript execution in the context of the WebUI for users who view affected pages, potentially enabling session token theft or unauthorized actions. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-rwj9-7j48-9f7q | Rucio WebUI Vulnerable to Stored Cross-site Scripting (XSS) through Custom Rule Function |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 26 Feb 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rucio
Rucio rucio |
|
| Vendors & Products |
Rucio
Rucio rucio |
Wed, 25 Feb 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Versions prior to 35.8.3, 38.5.4, and 39.3.1 have a stored Cross-Site Scripting (XSS) vulnerability in the Custom Rules function of the WebUI where attacker-controlled input is persisted by the backend and later rendered in the WebUI without proper output encoding. This allows arbitrary JavaScript execution in the context of the WebUI for users who view affected pages, potentially enabling session token theft or unauthorized actions. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue. | |
| Title | Rucio WebUI Vulnerable to Stored Cross-site Scripting (XSS) through Custom Rule Function | |
| Weaknesses | CWE-1004 CWE-79 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-26T16:02:31.146Z
Reserved: 2026-02-05T16:48:00.427Z
Link: CVE-2026-25733
No data.
Status : Received
Published: 2026-02-25T20:23:47.717
Modified: 2026-02-26T16:24:04.663
Link: CVE-2026-25733
No data.
OpenCVE Enrichment
Updated: 2026-02-26T13:14:57Z
Github GHSA