CVE-2026-26190

Source
https://cve.org/CVERecord?id=CVE-2026-26190
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26190.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-26190
Aliases
Downstream
Related
Published
2026-02-13T18:44:33.465Z
Modified
2026-04-02T13:19:35.130071Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Milvus Allows Unauthenticated Access to Restful API on Metrics Port (9091) Leads to Critical System Compromise
Details

Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default authentication token derived from etcd.rootPath (default: by-dev), enabling arbitrary expression evaluation. The full REST API (/api/v1/*) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management. This vulnerability is fixed in 2.5.27 and 2.6.10.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/26xxx/CVE-2026-26190.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-306"
    ]
}
References

Affected packages

Git / github.com/milvus-io/milvus

Affected ranges

Type
GIT
Repo
https://github.com/milvus-io/milvus
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "fixed": "2.5.27"
        }
    ]
}
Type
GIT
Repo
https://github.com/milvus-io/milvus
Events
Database specific
{
    "versions": [
        {
            "introduced": "2.6.0"
        },
        {
            "fixed": "2.6.10"
        }
    ]
}

Affected versions

client/v2.*
client/v2.5.0
client/v2.5.1
client/v2.5.2
client/v2.5.3
client/v2.5.4
client/v2.5.5
client/v2.5.6
client/v2.6.0
client/v2.6.0-rc.1
client/v2.6.1
client/v2.6.2
client/v2.6.3
pkg/v0.*
pkg/v0.0.1
pkg/v2.*
pkg/v2.5.10
pkg/v2.5.11
pkg/v2.5.12
pkg/v2.5.13
pkg/v2.5.14
pkg/v2.5.15
pkg/v2.5.16
pkg/v2.5.17
pkg/v2.5.18
pkg/v2.5.19
pkg/v2.5.20
pkg/v2.5.21
pkg/v2.5.22
pkg/v2.5.23
pkg/v2.5.24
pkg/v2.5.25
pkg/v2.5.26
pkg/v2.5.4
pkg/v2.5.5
pkg/v2.5.6
pkg/v2.5.7
pkg/v2.5.8
pkg/v2.5.9
pkg/v2.6.0
pkg/v2.6.1
pkg/v2.6.10
pkg/v2.6.11
pkg/v2.6.12
pkg/v2.6.13
pkg/v2.6.2
pkg/v2.6.3
pkg/v2.6.4
pkg/v2.6.5
pkg/v2.6.6
pkg/v2.6.7
pkg/v2.6.8
pkg/v2.6.9
v0.*
v0.10.0
v0.10.1
v0.10.2
v0.10.3
v0.10.4
v0.10.5
v0.10.6
v0.5.0
v0.5.1
v0.5.2
v0.5.3
v0.6.0
v0.7.0
v0.7.1
v0.8.0
v0.8.1
v0.9.0
v0.9.1
v1.*
v1.0.0
v1.1.0
v1.1.1
v2.*
v2.0.0
v2.0.0-pre-ga
v2.0.0-rc1
v2.0.0-rc2
v2.0.0-rc4
v2.0.0-rc5
v2.0.0-rc5-hotfix1
v2.0.0-rc6
v2.0.0-rc7
v2.0.0-rc8
v2.0.1
v2.0.2
v2.0.2-hotfix-16885
v2.1.0
v2.1.0-hotfix-dcd6c9e
v2.1.1
v2.1.2
v2.1.3
v2.1.4
v2.2-testing-20240702
v2.2.0
v2.2.1
v2.2.10
v2.2.11
v2.2.12
v2.2.13
v2.2.14
v2.2.15
v2.2.16
v2.2.2
v2.2.3
v2.2.4
v2.2.5
v2.2.6
v2.2.7
v2.2.8
v2.2.9
v2.3.0
v2.3.0-beta
v2.3.1
v2.3.10
v2.3.11
v2.3.12
v2.3.13
v2.3.14
v2.3.15
v2.3.16
v2.3.17
v2.3.18
v2.3.19
v2.3.2
v2.3.20
v2.3.21
v2.3.22
v2.3.3
v2.3.4
v2.3.5
v2.3.6
v2.3.7
v2.3.8
v2.3.9
v2.4.0
v2.4.0-rc.1
v2.4.1
v2.4.10
v2.4.11
v2.4.12
v2.4.13
v2.4.13-hotfix
v2.4.14
v2.4.14-hotfix
v2.4.15
v2.4.16
v2.4.17
v2.4.18
v2.4.19
v2.4.2
v2.4.20
v2.4.21
v2.4.22
v2.4.23
v2.4.24
v2.4.3
v2.4.4
v2.4.5
v2.4.6
v2.4.7
v2.4.8
v2.4.9
v2.5.0
v2.5.0-beta
v2.5.1
v2.5.10
v2.5.11
v2.5.12
v2.5.13
v2.5.14
v2.5.15
v2.5.16
v2.5.17
v2.5.18
v2.5.19
v2.5.2
v2.5.20
v2.5.21
v2.5.22
v2.5.23
v2.5.24
v2.5.25
v2.5.26
v2.5.3
v2.5.4
v2.5.5
v2.5.6
v2.5.7
v2.5.8
v2.5.9
v2.6.0
v2.6.0-rc1
v2.6.1
v2.6.10
v2.6.11
v2.6.12
v2.6.13
v2.6.2
v2.6.3
v2.6.4
v2.6.5
v2.6.6
v2.6.7
v2.6.8
v2.6.9

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-26190.json"