Description
Cube is a semantic layer for building data applications. From 1.1.17 to before 1.5.13 and 1.4.2, it is possible to make the entire Cube API unavailable by submitting a specially crafted request to a Cube API endpoint. This vulnerability is fixed in 1.5.13 and 1.4.2.
Published: 2026-02-09
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service (availability)
Action: Patch
AI Analysis

Impact

Cube, a semantic layer for building data applications, allows an authenticated attacker to bring the entire Cube API to a halt by submitting a specially crafted request to any Cube endpoint. The flaw is classified as CWE‑755 because the code fails to enforce correct control flow, leading to an unhandled exception that crashes the service. The resulting denial of service disrupts availability for all downstream applications that rely on the Cube API, but does not leak data or modify resources.

Affected Systems

Affected vendors and products include Cube, the Cube.js/cube library. The vulnerability affects all Cube releases from version 1.1.17 up to, but not including, 1.5.13, as well as the 1.4.2 release. Users running these versions without upgrading remain vulnerable. The product is built on Node.js, but the problem resides in the Cube code itself rather than the runtime.

Risk and Exploitability

The CVSS score of 6.5 places the flaw in the moderate range, while the EPSS score of less than 1% indicates a very low probability of exploitation at the time of analysis. The issue requires authenticated access to the Cube API, so an attacker must first obtain valid credentials or impersonate a logged‑in user. Nevertheless, once authenticated, the attacker can send a single crafted request that causes the Cube service to crash, leading to widespread outage. Although the exploit has not yet been observed in the wild and is not listed in CISA’s KEV catalog, organizations that expose Cube to external users or lack strict access controls should treat this as a noteworthy risk until they can update to a fixed release.

Generated by OpenCVE AI on April 17, 2026 at 21:03 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Cube version 1.5.13 or 1.4.2, whichever applies to your deployment.
  • Restrict access to Cube API endpoints to trusted users or IP ranges to limit the attack surface.
  • Implement application‑level rate limiting or request throttling on Cube endpoints to mitigate potential DoS attacks during the transition period.

Generated by OpenCVE AI on April 17, 2026 at 21:03 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-9vph-2hvm-x66g Cube Core is vulnerable to Denial of Service (DoS) via crafted request
History

Tue, 24 Feb 2026 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Cube
Cube cube.js
CPEs cpe:2.3:a:cube:cube.js:*:*:*:*:*:node.js:*:*
Vendors & Products Cube
Cube cube.js

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Cube-js
Cube-js cube
Vendors & Products Cube-js
Cube-js cube

Mon, 09 Feb 2026 23:00:00 +0000

Type Values Removed Values Added
Description Cube is a semantic layer for building data applications. From 1.1.17 to before 1.5.13 and 1.4.2, it is possible to make the entire Cube API unavailable by submitting a specially crafted request to a Cube API endpoint. This vulnerability is fixed in 1.5.13 and 1.4.2.
Title Cube Denial of Service (DoS) - An authenticated attacker can crash the server by sending a specially crafted request
Weaknesses CWE-755
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-11T21:23:47.950Z

Reserved: 2026-02-09T17:13:54.066Z

Link: CVE-2026-25957

cve-icon Vulnrichment

Updated: 2026-02-11T21:23:44.812Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T23:16:06.780

Modified: 2026-02-24T19:53:01.743

Link: CVE-2026-25957

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:15:27Z

Weaknesses