Description
Milvus is an open-source vector database built for generative AI applications. Prior to 2.5.27 and 2.6.10, Milvus exposes TCP port 9091 by default, which enables authentication bypasses. The /expr debug endpoint uses a weak, predictable default authentication token derived from etcd.rootPath (default: by-dev), enabling arbitrary expression evaluation. The full REST API (/api/v1/*) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management. This vulnerability is fixed in 2.5.27 and 2.6.10.
INFO
Published Date :
2026-02-13T18:44:33.465Z
Last Modified :
2026-02-26T14:44:20.414Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-26190 vulnerability.
| Vendors | Products |
|---|---|
| Milvus |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-26190.