๐Ÿ” CVE Alert

CVE-2026-26190

CRITICAL 9.8

Milvus Allows Unauthenticated Access to Restful API on Metrics Port (9091) Leads to Critical System Compromise

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default authentication token derived from etcd.rootPath (default: by-dev), enabling arbitrary expression evaluation. The full REST API (/api/v1/*) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management. This vulnerability is fixed in 2.5.27 and 2.6.10.

CWE CWE-306
Vendor milvus-io
Product milvus
Published Feb 13, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for milvus-io milvus

Be the first to know when new critical vulnerabilities affecting milvus-io milvus are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

milvus-io / milvus
< 2.5.27 >= 2.6.0, < 2.6.10

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/milvus-io/milvus/security/advisories/GHSA-7ppg-37fh-vcr6 github.com: https://github.com/milvus-io/milvus/commit/92b74dd2e286006a83b4a5f07951027b32e718a9 github.com: https://github.com/milvus-io/milvus/releases/tag/v2.5.27 github.com: https://github.com/milvus-io/milvus/releases/tag/v2.6.10