Cube is a semantic layer for building data applications. From 0.27.19 to before 1.5.13, 1.4.2, and 1.0.14, it is possible to make a specially crafted request with a valid API token that leads to privilege escalation. This vulnerability is fixed in 1.5.13, 1.4.2, and 1.0.14.
References
| Link | Resource |
|---|---|
| https://github.com/cube-js/cube/security/advisories/GHSA-v226-32c7-x2v7 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
19 Feb 2026, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:cube:cube.js:*:*:*:*:*:node.js:*:* | |
| First Time |
Cube
Cube cube.js |
|
| Summary |
|
|
| References | () https://github.com/cube-js/cube/security/advisories/GHSA-v226-32c7-x2v7 - Vendor Advisory |
09 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-09 23:16
Updated : 2026-02-19 19:36
NVD link : CVE-2026-25958
Mitre link : CVE-2026-25958
CVE.ORG link : CVE-2026-25958
JSON object : View
Products Affected
cube
- cube.js
CWE
CWE-807
Reliance on Untrusted Inputs in a Security Decision
