CVE-2026-25957: CWE-755: Improper Handling of Exceptional Conditions in cube-js cube
CVE-2026-25957 is a medium severity vulnerability affecting cube-js's Cube semantic layer versions from 1. 1. 17 up to but not including 1. 4. 2 and from 1. 5. 0 up to but not including 1. 5. 13. The flaw arises from improper handling of exceptional conditions (CWE-755), allowing an attacker with low privileges to submit specially crafted requests to Cube API endpoints, causing a denial of service by making the entire Cube API unavailable.
AI Analysis
Technical Summary
CVE-2026-25957 is a vulnerability in cube-js's Cube semantic layer, which is used to build data applications by providing a unified API for data querying and transformation. The vulnerability stems from improper handling of exceptional conditions (CWE-755) within the Cube API endpoints. Specifically, when a specially crafted request is submitted to the API, the system fails to correctly manage the resulting exceptions, leading to a denial of service (DoS) condition that renders the entire Cube API unavailable. This affects Cube versions from 1.1.17 up to but not including 1.4.2, and from 1.5.0 up to but not including 1.5.13. The CVSS v3.1 base score is 6.5, indicating a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The vulnerability allows an attacker with some level of privileges to disrupt the availability of the Cube API, potentially halting data application services relying on Cube. The issue is resolved in versions 1.4.2 and 1.5.13. No public exploits have been reported yet, but the vulnerability poses a risk to organizations using affected versions, especially those relying heavily on Cube for critical data operations.
Potential Impact
For European organizations, this vulnerability could lead to significant disruption of data applications that depend on cube-js's Cube semantic layer. The denial of service condition can halt data querying and analytics processes, impacting decision-making, reporting, and operational workflows. Industries such as finance, telecommunications, and e-commerce, which often rely on real-time data analytics, may experience operational delays and service degradation. The requirement for low privileges to exploit the vulnerability means that insider threats or compromised accounts could trigger the DoS, increasing risk. While confidentiality and integrity are not directly impacted, the availability loss can cause cascading effects on business continuity and customer service. Organizations with strict uptime requirements or regulatory obligations for data availability may face compliance challenges or financial losses due to service interruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading cube-js Cube to versions 1.4.2 or 1.5.13 or later, where the issue is fixed. Until upgrades are applied, organizations should implement strict access controls to limit who can send requests to Cube API endpoints, ensuring only trusted and authenticated users with necessary privileges have access. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block anomalous or malformed requests targeting Cube APIs. Monitoring and alerting should be enhanced to detect unusual API request patterns or service availability issues promptly. Additionally, organizations should review and harden their privilege management policies to minimize the number of users with the required privileges to exploit this vulnerability. Finally, consider implementing rate limiting on API endpoints to reduce the risk of denial of service from repeated malicious requests.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Ireland
CVE-2026-25957: CWE-755: Improper Handling of Exceptional Conditions in cube-js cube
Description
CVE-2026-25957 is a medium severity vulnerability affecting cube-js's Cube semantic layer versions from 1. 1. 17 up to but not including 1. 4. 2 and from 1. 5. 0 up to but not including 1. 5. 13. The flaw arises from improper handling of exceptional conditions (CWE-755), allowing an attacker with low privileges to submit specially crafted requests to Cube API endpoints, causing a denial of service by making the entire Cube API unavailable.
AI-Powered Analysis
Technical Analysis
CVE-2026-25957 is a vulnerability in cube-js's Cube semantic layer, which is used to build data applications by providing a unified API for data querying and transformation. The vulnerability stems from improper handling of exceptional conditions (CWE-755) within the Cube API endpoints. Specifically, when a specially crafted request is submitted to the API, the system fails to correctly manage the resulting exceptions, leading to a denial of service (DoS) condition that renders the entire Cube API unavailable. This affects Cube versions from 1.1.17 up to but not including 1.4.2, and from 1.5.0 up to but not including 1.5.13. The CVSS v3.1 base score is 6.5, indicating a medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no impact on confidentiality or integrity (C:N/I:N), but high impact on availability (A:H). The vulnerability allows an attacker with some level of privileges to disrupt the availability of the Cube API, potentially halting data application services relying on Cube. The issue is resolved in versions 1.4.2 and 1.5.13. No public exploits have been reported yet, but the vulnerability poses a risk to organizations using affected versions, especially those relying heavily on Cube for critical data operations.
Potential Impact
For European organizations, this vulnerability could lead to significant disruption of data applications that depend on cube-js's Cube semantic layer. The denial of service condition can halt data querying and analytics processes, impacting decision-making, reporting, and operational workflows. Industries such as finance, telecommunications, and e-commerce, which often rely on real-time data analytics, may experience operational delays and service degradation. The requirement for low privileges to exploit the vulnerability means that insider threats or compromised accounts could trigger the DoS, increasing risk. While confidentiality and integrity are not directly impacted, the availability loss can cause cascading effects on business continuity and customer service. Organizations with strict uptime requirements or regulatory obligations for data availability may face compliance challenges or financial losses due to service interruptions.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should prioritize upgrading cube-js Cube to versions 1.4.2 or 1.5.13 or later, where the issue is fixed. Until upgrades are applied, organizations should implement strict access controls to limit who can send requests to Cube API endpoints, ensuring only trusted and authenticated users with necessary privileges have access. Network-level protections such as Web Application Firewalls (WAFs) can be configured to detect and block anomalous or malformed requests targeting Cube APIs. Monitoring and alerting should be enhanced to detect unusual API request patterns or service availability issues promptly. Additionally, organizations should review and harden their privilege management policies to minimize the number of users with the required privileges to exploit this vulnerability. Finally, consider implementing rate limiting on API endpoints to reduce the risk of denial of service from repeated malicious requests.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-09T17:13:54.066Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698a673b4b57a58fa1774cd3
Added to database: 2/9/2026, 11:01:15 PM
Last enriched: 2/9/2026, 11:16:00 PM
Last updated: 2/10/2026, 12:20:36 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2258: Memory Corruption in aardappel lobster
MediumCVE-2026-0845: CWE-862 Missing Authorization in wclovers WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible
HighCVE-2025-15147: CWE-639 Authorization Bypass Through User-Controlled Key in wclovers WCFM Membership – WooCommerce Memberships for Multivendor Marketplace
MediumCVE-2025-15314: Improper Link Resolution Before File Access ('Link Following') in Tanium end-user-cx
MediumCVE-2025-15313: Improper Link Resolution Before File Access ('Link Following') in Tanium Tanium EUSS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.