CVE-2026-29090

Severity CVSS v4.0:
CRITICAL
Type:
CWE-89 SQL Injection
Publication date:
06/05/2026
Last modified:
11/05/2026

Description

### Summary<br /> <br /> A SQL injection vulnerability exists in Rucio versions 1.30.0 and later before 35.8.5, 38.5.5, 39.4.2, and 40.1.1, in `FilterEngine.create_postgres_query()`. This allows any authenticated Rucio user to execute arbitrary SQL against the PostgreSQL metadata database through the DID search endpoint (`GET /dids//dids/search`). When the `postgres_meta` metadata plugin is configured, attacker-controlled filter keys and values are interpolated directly into raw SQL strings via Python `.format()`, then passed to `psycopg3`&amp;#39;s `sql.SQL()` which treats the string as trusted SQL syntax. <br /> <br /> Depending on the database privileges assigned to the service account, exploitation can expose sensitive tables, modify or delete metadata, access server-side files, or achieve code execution through PostgreSQL features such as COPY ... FROM PROGRAM. This issue affects deployments that explicitly use the postgres_meta metadata plugin. This vulnerability has been fixed in versions 35.8.5, 38.5.5, 39.4.2, and 40.1.1.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:* 1.30.0 (including) 35.8.5 (excluding)
cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:* 36.0.0 (including) 38.5.5 (excluding)
cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:* 39.0.0 (including) 39.4.2 (excluding)
cpe:2.3:a:cern:rucio:*:*:*:*:*:*:*:* 40.0.0 (including) 40.1.1 (excluding)