CVE-2026-24810
Buffer Overflow in rethinkdb cJSON Module Allows Memory Corruption
Publication date: 2026-01-27
Last updated on: 2026-01-27
Assigner: Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rethinkdb | rethinkdb | to 2.4.4 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a classic buffer overflow in rethinkdb's src/cjson modules, specifically in the cJSON.Cc program files. It occurs because the software copies data into a buffer without checking the size of the input, which can lead to memory corruption.
How can this vulnerability impact me? :
The vulnerability can lead to severe security issues such as arbitrary code execution, denial of service, or system compromise because an attacker can exploit the buffer overflow to manipulate the program's behavior.