The nexent v1.7.5.2 backend service contains an unauthorized arbitrary file deletion vulnerability in its ElasticSearch service interface. The DELETE /{index_name}/documents endpoint lacks proper authentication and authorization controls and does not validate the user-supplied path_or_url parameter. This allows unauthenticated remote attackers to send crafted requests that trigger the deletion of arbitrary documents from ElasticSearch indices and corresponding files from the MinIO storage system. Successful exploitation leads to data destruction and denial of service.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthorized Arbitrary File Deletion in Nexent Backend via Unauthenticated ElasticSearch Endpoint | |
| Weaknesses | CWE-284 CWE-287 |
Tue, 12 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The nexent v1.7.5.2 backend service contains an unauthorized arbitrary file deletion vulnerability in its ElasticSearch service interface. The DELETE /{index_name}/documents endpoint lacks proper authentication and authorization controls and does not validate the user-supplied path_or_url parameter. This allows unauthenticated remote attackers to send crafted requests that trigger the deletion of arbitrary documents from ElasticSearch indices and corresponding files from the MinIO storage system. Successful exploitation leads to data destruction and denial of service. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-12T15:05:32.538Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31215
No data.
Status : Received
Published: 2026-05-12T16:16:13.380
Modified: 2026-05-12T16:16:13.380
Link: CVE-2026-31215
No data.
OpenCVE Enrichment
Updated: 2026-05-12T18:00:12Z