{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-01T05:34:54.296","vulnerabilities":[{"cve":{"id":"CVE-2026-25138","sourceIdentifier":"security-advisories@github.com","published":"2026-02-25T20:23:47.457","lastModified":"2026-02-27T17:35:41.793","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Prior to versions 35.8.3, 38.5.4, and 39.3.1, the WebUI login endpoint returns distinct error messages depending on whether a supplied username exists, allowing unauthenticated attackers to enumerate valid usernames. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue."},{"lang":"es","value":"Rucio es un framework de software que proporciona funcionalidad para organizar, gestionar y acceder a grandes volúmenes de datos científicos utilizando políticas personalizables. Antes de las versiones 35.8.3, 38.5.4 y 39.3.1, el endpoint de inicio de sesión de la WebUI devolvía mensajes de error distintos dependiendo de si un nombre de usuario proporcionado existía, permitiendo a atacantes no autenticados enumerar nombres de usuario válidos. Las versiones 35.8.3, 38.5.4 y 39.3.1 solucionan el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-204"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*","versionEndExcluding":"35.8.3","matchCriteriaId":"3BCD5122-895C-41F6-8DDE-5DD999D88FDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*","versionStartIncluding":"36.0.0","versionEndExcluding":"38.5.4","matchCriteriaId":"364DE7B4-B341-4A96-917B-B2D37777CB7E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*","versionStartIncluding":"39.0.0","versionEndExcluding":"39.3.1","matchCriteriaId":"EB66BA62-B3B2-45C5-99AC-59CC9B39F350"}]}]}],"references":[{"url":"https://cheatsheetseries.owasp.org/cheatsheets/Authentication_Cheat_Sheet.html#authentication-and-error-messages","source":"security-advisories@github.com","tags":["Not Applicable"]},{"url":"https://github.com/rucio/rucio/releases/tag/35.8.3","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/rucio/rucio/releases/tag/38.5.4","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/rucio/rucio/releases/tag/39.3.1","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/rucio/rucio/security/advisories/GHSA-38wq-6q2w-hcf9","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/rucio/rucio/security/advisories/GHSA-38wq-6q2w-hcf9","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}