Advisory Database
  • Advisories
  • Dependency Scanning
  1. cargo
  2. ›
  3. surrealdb
  4. ›
  5. GHSA-xx7m-69ff-9crp

GHSA-xx7m-69ff-9crp: SurrealDB vulnerable to Denial of Service through scripting function memory edge case

February 12, 2026

In SurrealDB instances with the scripting capability enabled (--allow-scripting), users with the ability to run arbitrary queries can trigger a server crash due to a memory-safety bug in the underlying JS engine. The SurrealDB instance terminates instantly, requiring a manual restart.

The query consists of using built-in string functions to construct a large string and passing it to the JavaScript runtime for compilation. The exact string size required to trigger the crash varies between SurrealDB versions.

Whilst exploiting the vulnerability requires users to be able to run arbitrary queries, if guest access (--allow-guests), is enabled, then guests can perform this attack.

References

  • github.com/advisories/GHSA-xx7m-69ff-9crp
  • github.com/surrealdb/surrealdb
  • github.com/surrealdb/surrealdb/commit/2b0389b92398d9ecff4632cd51bbf8303832a988
  • github.com/surrealdb/surrealdb/commit/bcd2ece9ef0d721215f06a47280698669f332285
  • github.com/surrealdb/surrealdb/pull/6774
  • github.com/surrealdb/surrealdb/pull/6833
  • github.com/surrealdb/surrealdb/security/advisories/GHSA-xx7m-69ff-9crp

Code Behaviors & Features

Detect and mitigate GHSA-xx7m-69ff-9crp with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2.6.1, all versions starting from 3.0.0-alpha.8 before 3.0.0-beta.3

Fixed versions

  • 2.6.1
  • 3.0.0-beta.3

Solution

Upgrade to versions 2.6.1, 3.0.0-beta.3 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Learn more about CVSS

Weakness

  • CWE-476: NULL Pointer Dereference

Source file

cargo/surrealdb/GHSA-xx7m-69ff-9crp.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Fri, 13 Feb 2026 00:19:10 +0000.