CVE-2026-25735

6.1 MEDIUM

📋 TL;DR

This stored XSS vulnerability in Rucio's WebUI allows attackers to inject malicious JavaScript into the Identity Name field, which persists in the backend and executes when users view affected pages. This can lead to session token theft or unauthorized actions in the WebUI context. Users of Rucio versions prior to 35.8.3, 38.5.4, and 39.3.1 are affected.

💻 Affected Systems

Products:
  • Rucio
Versions: All versions prior to 35.8.3, 38.5.4, and 39.3.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the WebUI component; command-line and API interfaces are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover via session token theft, leading to unauthorized data access, policy manipulation, or data deletion in the Rucio system.

🟠

Likely Case

Session hijacking allowing unauthorized access to the victim's Rucio WebUI, potentially enabling data viewing or limited unauthorized actions.

🟢

If Mitigated

No impact if proper output encoding is implemented or if the vulnerability is patched before exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to have access to create/modify identity names in Rucio, then wait for victims to view affected pages.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 35.8.3, 38.5.4, or 39.3.1 depending on your branch

Vendor Advisory: https://github.com/rucio/rucio/security/advisories/GHSA-8wpv-6x3f-3rm5

Restart Required: Yes

Instructions:

1. Identify your Rucio version branch (35.x, 38.x, or 39.x). 2. Upgrade to the corresponding patched version: 35.8.3, 38.5.4, or 39.3.1. 3. Restart all Rucio services including the WebUI.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize Identity Name fields before storage

# Requires code modification - implement proper HTML encoding for Identity Name fields

Content Security Policy

all

Implement strict CSP headers to limit script execution

# Add to web server configuration: Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Restrict access to Rucio WebUI to trusted users only using network segmentation
  • Implement WAF rules to detect and block XSS payloads in Identity Name fields

🔍 How to Verify

Check if Vulnerable:

Check Rucio version against affected versions: if running any version before 35.8.3, 38.5.4, or 39.3.1, you are vulnerable.

Check Version:

rucio --version

Verify Fix Applied:

After patching, test by attempting to inject basic XSS payloads into Identity Name fields and verify they are properly encoded when displayed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript patterns in Identity Name fields
  • Multiple failed login attempts from new locations

Network Indicators:

  • Unexpected outbound connections from Rucio WebUI sessions

SIEM Query:

source="rucio_webui" AND (message="*<script>*" OR message="*javascript:*")

🔗 References

📤 Share & Export