CVE-2026-25734
Received Received - Intake
Stored XSS in Rucio WebUI RSE Metadata Enables Session Hijacking

Publication date: 2026-02-25

Last updated on: 2026-02-27

Assigner: GitHub, Inc.

Description
Rucio is a software framework that provides functionality to organize, manage, and access large volumes of scientific data using customizable policies. Versions prior to 35.8.3, 38.5.4, and 39.3.1 have a stored Cross-Site Scripting (XSS) vulnerability in the RSE metadata of the WebUI where attacker-controlled input is persisted by the backend and later rendered in the WebUI without proper output encoding. This allows arbitrary JavaScript execution in the context of the WebUI for users who view affected pages, potentially enabling session token theft or unauthorized actions. Versions 35.8.3, 38.5.4, and 39.3.1 fix the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-25
Last Modified
2026-02-27
Generated
2026-05-07
AI Q&A
2026-02-25
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
cern rucio to 35.8.3 (exc)
cern rucio From 36.0.0 (inc) to 38.5.4 (exc)
cern rucio From 39.0.0 (inc) to 39.3.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-1004 The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-25734 is a stored Cross-Site Scripting (XSS) vulnerability in the Rucio WebUI, specifically in the RSE metadata fields such as City, Country_Name, and ISP. These fields accept attacker-controlled input that is stored by the backend and later rendered in the WebUI without proper output encoding or sanitization.

This flaw allows an attacker to submit malicious JavaScript code via POST requests to certain endpoints, which then executes whenever an authenticated user views the affected pages. This arbitrary JavaScript execution happens in the context of the WebUI.

The vulnerability can lead to session token theft and unauthorized actions within the WebUI, such as creating or deleting RSEs or creating new UserPass identities with attacker-known passwords.


How can this vulnerability impact me? :

This vulnerability can have significant impacts including theft of session tokens and API tokens, which are accessible to JavaScript due to missing security flags like HttpOnly.

An attacker exploiting this vulnerability can perform unauthorized actions such as creating or deleting RSEs or creating new user identities with known passwords, potentially compromising the integrity of the system.

Because the malicious script executes in the context of the WebUI, it can exfiltrate sensitive information by sending it to attacker-controlled domains.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by checking for the presence of malicious JavaScript payloads in the RSE metadata fields such as City, Country_Name, and ISP within the Rucio WebUI. Specifically, look for stored scripts like <script>alert('XSS')</script> in the RSE Management dashboard under paths such as Admin > RSE Management and Admin > RSE Management > RSE NAME."}, {'type': 'paragraph', 'content': 'One way to detect exploitation attempts is to monitor POST requests to endpoints like /proxy/rses/XSSTEST where attacker-controlled input might be submitted.'}, {'type': 'paragraph', 'content': 'Suggested commands include using curl or similar tools to send test POST requests with a benign XSS payload to the suspected endpoints, for example:'}, {'type': 'list_item', 'content': 'curl -X POST -d "City=<script>alert(\'XSS\')</script>" https://your-rucio-instance/proxy/rses/XSSTEST -b cookie.txt -c cookie.txt'}, {'type': 'list_item', 'content': 'Then, access the RSE Management pages in a browser with developer tools open to check if the script executes.'}, {'type': 'paragraph', 'content': 'Additionally, reviewing the source code or logs for unsafe rendering methods like .html() without sanitization in the WebUI code can help identify vulnerable spots.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

The primary immediate mitigation step is to upgrade Rucio to one of the patched versions: 35.8.3, 38.5.4, or 39.3.1, which fix the stored XSS vulnerability.

Avoid using unsafe rendering methods such as .html() without proper sanitization when displaying user-controlled metadata in the WebUI.

Use safer alternatives like .text(), text nodes, or templating systems that automatically escape output to prevent script injection.

Implement additional defense-in-depth measures such as enforcing strict Content Security Policies (CSP) to restrict the execution of unauthorized scripts.

Set the HttpOnly flag on session cookies to prevent JavaScript access to session tokens.

Avoid exposing API tokens in JavaScript-accessible variables to reduce the risk of token exfiltration.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart