Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31827: CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in Blue-B Alienbin

0
High
VulnerabilityCVE-2026-31827cvecve-2026-31827cwe-362
Published: Tue Mar 10 2026 (03/10/2026, 21:39:58 UTC)
Source: CVE Database V5
Vendor/Project: Blue-B
Product: Alienbin

Description

CVE-2026-31827 is a high-severity race condition vulnerability affecting Blue-B's Alienbin version 1. 0. 0 and earlier. The vulnerability arises because the /save endpoint drops and recreates the MongoDB TTL index on the entire post collection for every new paste submission. An attacker can exploit this by submitting pastes with a very short TTL (e. g. , 30 seconds), causing the TTL index to be reset with a short expiration time for all documents. This results in unintended deletion of other users' pastes that were originally set to expire after much longer periods, effectively enabling mass deletion of data. The vulnerability requires no user interaction and can be exploited remotely without authentication, making it easily exploitable. Although no known exploits are reported in the wild yet, the impact on data availability is significant.

AI-Powered Analysis

AILast updated: 03/11/2026, 16:29:06 UTC

Technical Analysis

Alienbin is an anonymous code and text sharing web service developed by Blue-B. In versions 1.0.0 and earlier, the /save endpoint in the server.js file manages the MongoDB TTL (Time To Live) index on the post collection by dropping and recreating it every time a new paste is submitted. This design flaw introduces a race condition vulnerability (CWE-362) where the TTL index's expireAfterSeconds value is globally reset based on the TTL of the most recent paste submission. For example, if User B submits a paste with a TTL of 30 seconds, the TTL index is recreated with expireAfterSeconds set to 30 seconds for the entire collection. Consequently, User A's paste, which might have been intended to persist for 7 days, will now expire and be deleted after only 30 seconds. An attacker can exploit this by repeatedly submitting pastes with very short TTL values, causing all existing pastes to be prematurely deleted. This vulnerability impacts data availability and integrity by allowing unauthorized mass deletion of stored pastes. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on availability. No patches or fixes are currently linked, and no known exploits have been observed in the wild as of the publication date.

Potential Impact

The primary impact of CVE-2026-31827 is on data availability and integrity within the Alienbin service. Attackers can cause mass deletion of stored pastes by manipulating the TTL index, leading to loss of user-submitted content. For organizations relying on Alienbin for anonymous code or text sharing, this could disrupt collaboration, cause data loss, and damage user trust. Since the vulnerability can be exploited remotely without authentication or user interaction, it poses a significant risk of denial-of-service-like conditions where legitimate data is deleted prematurely. This could also be leveraged in targeted attacks to erase specific users' data or disrupt services that depend on persistent pastes. The vulnerability does not directly impact confidentiality but undermines the reliability and availability of the service. Given the ease of exploitation and the global accessibility of the service, the threat could affect a broad range of users and organizations worldwide.

Mitigation Recommendations

To mitigate CVE-2026-31827, organizations using Alienbin should implement the following specific measures: 1) Avoid dropping and recreating the MongoDB TTL index on the entire collection for each new paste submission. Instead, create a single TTL index with a fixed expireAfterSeconds value and manage per-document expiration using a dedicated field with MongoDB's TTL feature. 2) Implement application-level logic to set individual document expiration times without altering the global TTL index. 3) Restrict the ability to submit pastes with extremely short TTL values by enforcing minimum TTL thresholds or validating TTL inputs server-side. 4) Monitor and rate-limit paste submissions to prevent abuse through rapid repeated submissions that could trigger mass deletions. 5) Upgrade to a patched version of Alienbin once available or apply custom patches to fix the index recreation logic. 6) Regularly back up the paste collection to enable recovery from unintended deletions. 7) Audit and log paste submissions and TTL index changes to detect suspicious activity. These targeted mitigations address the root cause of the race condition and minimize the risk of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-09T17:41:56.077Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69b194fa2f860ef943342476

Added to database: 3/11/2026, 4:14:50 PM

Last enriched: 3/11/2026, 4:29:06 PM

Last updated: 3/11/2026, 6:32:21 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses