{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T17:50:55.311","vulnerabilities":[{"cve":{"id":"CVE-2026-25736","sourceIdentifier":"security-advisories@github.com","published":"2026-02-25T20:23:48.243","lastModified":"2026-02-27T19:24:13.017","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Versions prior to 35.8.3, 38.5.4, and 39.3.1 have a stored Cross-Site Scripting (XSS) vulnerability in the Custom RSE Attribute of the WebUI where attacker-controlled input is persisted by the backend and later rendered in the WebUI without proper output encoding. This allows arbitrary JavaScript execution in the context of the WebUI for users who view affected pages, potentially enabling session token theft or unauthorized actions. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue."},{"lang":"es","value":"Rucio es un framework de software que proporciona funcionalidad para organizar, gestionar y acceder a grandes volúmenes de datos científicos utilizando políticas personalizables. Las versiones anteriores a la 35.8.3, 38.5.4 y 39.3.1 tienen una vulnerabilidad de cross-site scripting (XSS) almacenado en el Custom RSE Attribute de la WebUI, donde la entrada controlada por el atacante es persistida por el backend y posteriormente renderizada en la WebUI sin una codificación de salida adecuada. Esto permite la ejecución arbitraria de JavaScript en el contexto de la WebUI para los usuarios que visualizan las páginas afectadas, lo que podría permitir el robo de tokens de sesión o acciones no autorizadas. Las versiones 35.8.3, 38.5.4 y 39.3.1 solucionan el problema."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":0.9,"impactScore":5.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"},{"lang":"en","value":"CWE-1004"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*","versionEndExcluding":"35.8.3","matchCriteriaId":"3BCD5122-895C-41F6-8DDE-5DD999D88FDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*","versionStartIncluding":"36.0.0","versionEndExcluding":"38.5.4","matchCriteriaId":"364DE7B4-B341-4A96-917B-B2D37777CB7E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:*","versionStartIncluding":"39.0.0","versionEndExcluding":"39.3.1","matchCriteriaId":"EB66BA62-B3B2-45C5-99AC-59CC9B39F350"}]}]}],"references":[{"url":"https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html","source":"security-advisories@github.com","tags":["Not Applicable"]},{"url":"https://github.com/rucio/rucio/releases/tag/35.8.3","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/rucio/rucio/releases/tag/38.5.4","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/rucio/rucio/releases/tag/39.3.1","source":"security-advisories@github.com","tags":["Product","Release Notes"]},{"url":"https://github.com/rucio/rucio/security/advisories/GHSA-fq4f-4738-rqxm","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]},{"url":"https://github.com/rucio/rucio/security/advisories/GHSA-fq4f-4738-rqxm","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Vendor Advisory"]}]}}]}