Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25957: CWE-755: Improper Handling of Exceptional Conditions in cube-js cube

0
Medium
VulnerabilityCVE-2026-25957cvecve-2026-25957cwe-755
Published: Mon Feb 09 2026 (02/09/2026, 22:39:16 UTC)
Source: CVE Database V5
Vendor/Project: cube-js
Product: cube

Description

CVE-2026-25957 is a medium severity vulnerability affecting cube-js's Cube semantic layer versions from 1. 1. 17 up to but not including 1. 4. 2 and from 1. 5. 0 up to but not including 1. 5. 13. The flaw arises from improper handling of exceptional conditions (CWE-755), allowing an attacker with low privileges to submit specially crafted requests to Cube API endpoints, causing a denial of service by making the entire Cube API unavailable.

AI-Powered Analysis

AILast updated: 02/09/2026, 23:16:00 UTC

Technical Analysis

CVE-2026-25957 is a vulnerability in cube-js's Cube semantic layer, which is used to build data applications by providing a unified API for data querying and transformation. The vulnerability stems from improper handling of exceptional conditions (CWE-755) within the Cube API endpoints. Specifically, when a specially crafted request is submitted to the API, the system fails to correctly manage the resulting exceptions, leading to a denial of service (DoS) condition that renders the entire Cube API unavailable. This affects Cube versions from 1.1.17 up to but not including 1.4.2, and from 1.5.0 up to but not including 1.5.13. The CVSS v3.1 base score is 6.5, indicating a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The vulnerability allows an attacker with some level of privileges to disrupt the availability of the Cube API, potentially halting data application services relying on Cube. The issue is resolved in versions 1.4.2 and 1.5.13. No public exploits have been reported yet, but the vulnerability poses a risk to organizations using affected versions, especially those relying heavily on Cube for critical data operations.

Potential Impact

For European organizations, this vulnerability could lead to significant disruption of data applications that depend on cube-js's Cube semantic layer. The denial of service condition can halt data querying and analytics processes, impacting decision-making, reporting, and operational workflows. Industries such as finance, telecommunications, and e-commerce, which often rely on real-time data analytics, may experience operational delays and service degradation. The requirement for low privileges to exploit the vulnerability means that insider threats or compromised accounts could trigger the DoS, increasing risk. While confidentiality and integrity are not directly impacted, the availability loss can cause cascading effects on business continuity and customer service. Organizations with strict uptime requirements or regulatory obligations for data availability may face compliance challenges or financial losses due to service interruptions.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should prioritize upgrading cube-js Cube to versions 1.4.2 or 1.5.13 or later, where the issue is fixed. Until upgrades are applied, organizations should implement strict access controls to limit who can send requests to Cube API endpoints, ensuring only trusted and authenticated users with necessary privileges have access. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block anomalous or malformed requests targeting Cube APIs. Monitoring and alerting should be enhanced to detect unusual API request patterns or service availability issues promptly. Additionally, organizations should review and harden their privilege management policies to minimize the number of users with the required privileges to exploit this vulnerability. Finally, consider implementing rate limiting on API endpoints to reduce the risk of denial of service from repeated malicious requests.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T17:13:54.066Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a673b4b57a58fa1774cd3

Added to database: 2/9/2026, 11:01:15 PM

Last enriched: 2/9/2026, 11:16:00 PM

Last updated: 2/10/2026, 12:20:36 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats