CVE-2026-29090
Severity CVSS v4.0:
CRITICAL
Type:
CWE-89
SQL Injection
Publication date:
06/05/2026
Last modified:
11/05/2026
Description
### Summary<br />
<br />
A SQL injection vulnerability exists in Rucio versions 1.30.0 and later before 35.8.5, 38.5.5, 39.4.2, and 40.1.1, in `FilterEngine.create_postgres_query()`. This allows any authenticated Rucio user to execute arbitrary SQL against the PostgreSQL metadata database through the DID search endpoint (`GET /dids//dids/search`). When the `postgres_meta` metadata plugin is configured, attacker-controlled filter keys and values are interpolated directly into raw SQL strings via Python `.format()`, then passed to `psycopg3`&#39;s `sql.SQL()` which treats the string as trusted SQL syntax. <br />
<br />
Depending on the database privileges assigned to the service account, exploitation can expose sensitive tables, modify or delete metadata, access server-side files, or achieve code execution through PostgreSQL features such as COPY ... FROM PROGRAM. This issue affects deployments that explicitly use the postgres_meta metadata plugin. This vulnerability has been fixed in versions 35.8.5, 38.5.5, 39.4.2, and 40.1.1.
Impact
Base Score 4.0
9.00
Severity 4.0
CRITICAL
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:* | 1.30.0 (including) | 35.8.5 (excluding) |
| cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:* | 36.0.0 (including) | 38.5.5 (excluding) |
| cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:* | 39.0.0 (including) | 39.4.2 (excluding) |
| cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:* | 40.0.0 (including) | 40.1.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



