Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15453: Deserialization in milvus

0
Medium
VulnerabilityCVE-2025-15453cvecve-2025-15453
Published: Mon Jan 05 2026 (01/05/2026, 02:32:06 UTC)
Source: CVE Database V5
Product: milvus

Description

A security vulnerability has been detected in milvus up to 2.6.7. This vulnerability affects the function expr.Exec of the file pkg/util/expr/expr.go of the component HTTP Endpoint. The manipulation of the argument code leads to deserialization. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. A fix is planned for the next release 2.6.8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 23:06:20 UTC

Technical Analysis

CVE-2025-15453 identifies a deserialization vulnerability in Milvus, an open-source vector database widely used for AI and similarity search applications. The flaw exists in the expr.Exec function within the pkg/util/expr/expr.go file, part of the HTTP endpoint component. The vulnerability is triggered by manipulation of the 'code' argument, which is deserialized unsafely, allowing remote attackers to execute crafted payloads. This can lead to unauthorized code execution or other malicious behavior. The vulnerability requires no user interaction and no authentication, making it remotely exploitable over the network with low complexity. The CVSS 4.0 score is 5.3 (medium), reflecting limited but meaningful impact on confidentiality, integrity, and availability. The vulnerability affects all Milvus versions from 2.6.0 through 2.6.7. Although no exploits are currently observed in the wild, the public disclosure increases the likelihood of exploitation attempts. A patch is planned for version 2.6.8, but until then, systems remain vulnerable. The vulnerability stems from insecure deserialization, a common vector for remote code execution and system compromise in modern applications.

Potential Impact

The vulnerability could allow remote attackers to execute arbitrary code or manipulate data within Milvus instances, potentially leading to partial compromise of confidentiality, integrity, and availability of the vector database service. This could disrupt AI workloads, degrade service reliability, or expose sensitive data processed by Milvus. Organizations relying on Milvus for critical AI, search, or data analytics functions may experience operational disruptions or data breaches. Since the vulnerability requires no authentication or user interaction, attackers can exploit it remotely with relative ease, increasing the risk of widespread attacks. However, the impact is somewhat limited by the scope of affected components and the medium severity rating. Still, unpatched systems in production environments represent a significant risk, especially where Milvus is integrated into larger data pipelines or exposed to untrusted networks.

Mitigation Recommendations

1. Apply the official patch as soon as Milvus version 2.6.8 is released to remediate the vulnerability. 2. Until patching is possible, restrict network access to Milvus HTTP endpoints to trusted internal networks only, using firewalls or network segmentation. 3. Implement strict input validation and sanitization on all inputs to the expr.Exec function or any interfaces accepting 'code' arguments to prevent malicious payloads. 4. Monitor logs and network traffic for unusual or unexpected requests targeting the expr.Exec endpoint. 5. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block deserialization attack patterns. 6. Conduct regular security assessments and code reviews focusing on deserialization and input handling in Milvus deployments. 7. Educate DevOps and security teams about the risks of insecure deserialization and the importance of timely patching. 8. Consider isolating Milvus instances in containerized or sandboxed environments to limit potential damage from exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-04T08:52:58.262Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695b2c97db813ff03e0dbd54

Added to database: 1/5/2026, 3:14:31 AM

Last enriched: 2/23/2026, 11:06:20 PM

Last updated: 3/26/2026, 4:35:42 AM

Views: 216

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses