Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. rucio
  4. ›
  5. CVE-2026-29080

CVE-2026-29080: Rucio has SQL Injection in FilterEngine Oracle JSON Path via DID Search API

May 6, 2026

A SQL injection vulnerability in the Oracle path of FilterEngine.create_sqla_query allows any authenticated Rucio user to execute arbitrary SQL against the backend database through the DID search endpoint (GET /dids/<scope>/dids/search). Attacker-controlled filter keys and values are interpolated directly into sqlalchemy.text via Python str.format, completely bypassing parameterization. This enables full database compromise including extraction of authentication tokens, password hashes, and all managed data identifiers. The vulnerability is affecting deployments using the default metadata plugin configuration json_meta with Oracle database backends.

References

  • github.com/advisories/GHSA-vjr5-c9qv-hgm3
  • github.com/rucio/rucio
  • github.com/rucio/rucio/security/advisories/GHSA-vjr5-c9qv-hgm3
  • nvd.nist.gov/vuln/detail/CVE-2026-29080

Code Behaviors & Features

Detect and mitigate CVE-2026-29080 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.27.0 before 35.8.5, all versions starting from 36.0.0 before 38.5.5, all versions starting from 39.0.0 before 39.4.2, all versions starting from 40.0.0 before 40.1.1

Fixed versions

  • 35.8.5
  • 38.5.5
  • 39.4.2
  • 40.1.1

Solution

Upgrade to versions 35.8.5, 38.5.5, 39.4.2, 40.1.1 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

pypi/rucio/CVE-2026-29080.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:20:43 +0000.