Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthorized Deletion of Files via Backend REST API |
Wed, 13 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthorized Deletion of Files via Unauthenticated DELETE Endpoint in Nexent v1.7.5.2 | |
| Weaknesses | CWE-20 CWE-284 |
Wed, 13 May 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-552 | |
| Metrics |
cvssV3_1
|
Tue, 12 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthorized Deletion of Files via Unauthenticated DELETE Endpoint in Nexent v1.7.5.2 | |
| Weaknesses | CWE-20 CWE-284 |
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The nexent v1.7.5.2 backend service contains an unauthorized arbitrary storage file deletion vulnerability in its file management API. The DELETE /storage/{object_name:path} endpoint lacks authentication, authorization, and input validation mechanisms. Unauthenticated remote attackers can send crafted requests with a user-controlled object_name path parameter to delete arbitrary files from the underlying MinIO storage system. Successful exploitation leads to data loss and denial of service. | |
| References |
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-13T14:00:22.584Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31216
Updated: 2026-05-13T14:00:18.152Z
Status : Awaiting Analysis
Published: 2026-05-12T16:16:13.493
Modified: 2026-05-13T15:52:25.637
Link: CVE-2026-31216
No data.
OpenCVE Enrichment
Updated: 2026-05-13T19:00:15Z