Description
Cube is a semantic layer for building data applications. From 0.27.19 to before 1.5.13, 1.4.2, and 1.0.14, it is possible to make a specially crafted request with a valid API token that leads to privilege escalation. This vulnerability is fixed in 1.5.13, 1.4.2, and 1.0.14.
Published: 2026-02-09
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Patch
AI Analysis

Impact

Cube, a semantic data layer for building applications, contains a flaw that allows a user with a valid API token to execute a specially crafted request that elevates their privileges. The vulnerability follows the CWE‑807 “Privilege Escalation by Insufficient Authorization Checks” pattern and is described as a direct elevation of privileges, not a general remote code execution or denial‑of‑service condition.

Affected Systems

Cube version 0.27.19 up to, but not including, 1.5.13, 1.4.2, and 1.0.14 are affected. Users running any of these supported releases should verify whether their installation matches the vulnerable version range and consider the impact of privileged API token misuse.

Risk and Exploitability

The CVSS score of 7.7 indicates medium‑to‑high severity, and the EPSS score of less than 1% suggests that exploitation occurs with low probability as of the measured data. The vulnerability is not listed in the CISA KEV catalog, implying it has not yet been widely exploited in the wild. Attackers would need a valid API token to send the crafted request, indicating that the primary vector is authenticated API usage; however, because tokens can sometimes be leaked or reused, the risk remains significant for systems with broad token scopes. The lack of a known workaround emphasizes the importance of applying the vendor’s patched releases to mitigate this privileged contention.

Generated by OpenCVE AI on April 17, 2026 at 21:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Cube to a fixed release—1.5.13, 1.4.2, or 1.0.14 depending on your deployment.
  • Restrict the use of API tokens to the minimum set of permissions required for each user or application and rotate or revoke unused tokens.
  • Audit application logs for unexpected privilege changes or anomalous API calls and enforce strict role‑based access control policies.

Generated by OpenCVE AI on April 17, 2026 at 21:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-v226-32c7-x2v7 Cube Core is vulnerable to privilege escalation via a specially crafted request
History

Thu, 19 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Cube
Cube cube.js
CPEs cpe:2.3:a:cube:cube.js:*:*:*:*:*:node.js:*:*
Vendors & Products Cube
Cube cube.js

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Cube-js
Cube-js cube
Vendors & Products Cube-js
Cube-js cube

Mon, 09 Feb 2026 23:00:00 +0000

Type Values Removed Values Added
Description Cube is a semantic layer for building data applications. From 0.27.19 to before 1.5.13, 1.4.2, and 1.0.14, it is possible to make a specially crafted request with a valid API token that leads to privilege escalation. This vulnerability is fixed in 1.5.13, 1.4.2, and 1.0.14.
Title Cube privilege escalation via a specially crafted request
Weaknesses CWE-807
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-11T21:26:55.991Z

Reserved: 2026-02-09T17:13:54.066Z

Link: CVE-2026-25958

cve-icon Vulnrichment

Updated: 2026-02-11T21:26:53.479Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-09T23:16:06.957

Modified: 2026-02-19T19:36:28.917

Link: CVE-2026-25958

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:15:27Z

Weaknesses