CVE-2026-26190

Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default authentication token derived from etcd.rootPath (default: by-dev), enabling arbitrary expression evaluation. The full REST API (/api/v1/*) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management. This vulnerability is fixed in 2.5.27 and 2.6.10.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:milvus:milvus:*:*:*:*:*:*:*:*
cpe:2.3:a:milvus:milvus:*:*:*:*:*:*:*:*

History

18 Feb 2026, 19:11

Type Values Removed Values Added
CPE cpe:2.3:a:milvus:milvus:*:*:*:*:*:*:*:*
First Time Milvus
Milvus milvus
References () https://github.com/milvus-io/milvus/commit/92b74dd2e286006a83b4a5f07951027b32e718a9 - () https://github.com/milvus-io/milvus/commit/92b74dd2e286006a83b4a5f07951027b32e718a9 - Patch
References () https://github.com/milvus-io/milvus/releases/tag/v2.5.27 - () https://github.com/milvus-io/milvus/releases/tag/v2.5.27 - Product, Release Notes
References () https://github.com/milvus-io/milvus/releases/tag/v2.6.10 - () https://github.com/milvus-io/milvus/releases/tag/v2.6.10 - Product, Release Notes
References () https://github.com/milvus-io/milvus/security/advisories/GHSA-7ppg-37fh-vcr6 - () https://github.com/milvus-io/milvus/security/advisories/GHSA-7ppg-37fh-vcr6 - Exploit, Mitigation, Vendor Advisory

13 Feb 2026, 19:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-13 19:17

Updated : 2026-02-18 19:11


NVD link : CVE-2026-26190

Mitre link : CVE-2026-26190

CVE.ORG link : CVE-2026-26190


JSON object : View

Products Affected

milvus

  • milvus
CWE
CWE-306

Missing Authentication for Critical Function