Home

Description

Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default authentication token derived from etcd.rootPath (default: by-dev), enabling arbitrary expression evaluation. The full REST API (/api/v1/*) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management. This vulnerability is fixed in 2.5.27 and 2.6.10.

PUBLISHED Reserved 2026-02-11 | Published 2026-02-13 | Updated 2026-02-18 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-306: Missing Authentication for Critical Function

Product status

< 2.5.27
affected

>= 2.6.0, < 2.6.10
affected

References

github.com/...milvus/security/advisories/GHSA-7ppg-37fh-vcr6

github.com/...ommit/92b74dd2e286006a83b4a5f07951027b32e718a9

github.com/milvus-io/milvus/releases/tag/v2.5.27

github.com/milvus-io/milvus/releases/tag/v2.6.10

cve.org (CVE-2026-26190)

nvd.nist.gov (CVE-2026-26190)

Download JSON