Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-31215
Received
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-12 May, 2026 | 16:16
Updated At-12 May, 2026 | 16:16

The nexent v1.7.5.2 backend service contains an unauthorized arbitrary file deletion vulnerability in its ElasticSearch service interface. The DELETE /{index_name}/documents endpoint lacks proper authentication and authorization controls and does not validate the user-supplied path_or_url parameter. This allows unauthenticated remote attackers to send crafted requests that trigger the deletion of arbitrary documents from ElasticSearch indices and corresponding files from the MinIO storage system. Successful exploitation leads to data destruction and denial of service.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
CPE Matches

Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/ModelEngine-Group/nexentcve@mitre.org
N/A
https://www.notion.so/CVE-2026-31215-35d1e139318881f5946ed206d96e34d8cve@mitre.org
N/A
Hyperlink: https://github.com/ModelEngine-Group/nexent
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://www.notion.so/CVE-2026-31215-35d1e139318881f5946ed206d96e34d8
Source: cve@mitre.org
Resource: N/A
Change History
0Changes found

Details not found