Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 06 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Milvus
Milvus milvus |
|
| Vendors & Products |
Milvus
Milvus milvus |
Mon, 05 Jan 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in milvus up to 2.6.7. This vulnerability affects the function expr.Exec of the file pkg/util/expr/expr.go of the component HTTP Endpoint. The manipulation of the argument code leads to deserialization. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. A fix is planned for the next release 2.6.8. | |
| Title | milvus HTTP Endpoint expr.go expr.Exec deserialization | |
| Weaknesses | CWE-20 CWE-502 |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T08:16:08.533Z
Reserved: 2026-01-04T08:52:58.262Z
Link: CVE-2025-15453
Updated: 2026-01-06T19:03:36.624Z
Status : Deferred
Published: 2026-01-05T03:15:50.293
Modified: 2026-04-29T01:00:01.613
Link: CVE-2025-15453
No data.
OpenCVE Enrichment
Updated: 2026-01-05T10:13:21Z