Vulnerability DatabaseGHSA-x5fr-7hhj-34j3

GHSA-x5fr-7hhj-34j3
Rust vulnerability analysis and mitigation

Overview

A high-severity vulnerability (GHSA-x5fr-7hhj-34j3) was discovered in SurrealDB affecting versions prior to 1.0.1. The vulnerability relates to default table permissions being set to FULL instead of NONE, which was disclosed on December 14, 2023. This security issue affects the SurrealDB database system, particularly impacting table permission controls (GitHub Advisory).

Technical details

The vulnerability stems from SurrealDB's default configuration where tables were automatically granted FULL permissions for SELECT, CREATE, UPDATE, and DELETE operations unless explicitly specified otherwise through the PERMISSIONS clause. The issue has been assigned a CVSS score of 8.8 (High), with the following characteristics: Network attack vector, Low attack complexity, Low privileges required, No user interaction needed, and High impact on Confidentiality, Integrity, and Availability (GitHub Advisory).

Impact

The vulnerability allows any authorized client to have full access to tables defined without explicit permissions within their authorization scope (namespace or database). This impact is particularly significant for SurrealDB instances with guest access and publicly exposed interfaces (HTTP REST API or WebSocket API), where unauthenticated remote users could potentially gain complete access to tables lacking explicit permission definitions (GitHub Advisory).

Mitigation and workarounds

The issue has been patched in version 1.0.1 and later releases, including version 1.1.0-beta.1 and latest nightly releases. In patched versions, tables defined without explicit permissions default to NONE permissions, and table permissions are always explicitly displayed with the INFO FOR DB statement. For unpatched versions, users can mitigate the issue by explicitly defining table permissions using the PERMISSIONS clause, such as 'DEFINE TABLE secure PERMISSIONS NONE' or more granular permission definitions (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related Rust vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22257HIGH8.8
  • RustRust
  • salvo
NoYesJan 08, 2026
CVE-2026-22698HIGH8.7
  • RustRust
  • sm2
NoNoJan 10, 2026
CVE-2026-22699HIGH7.5
  • RustRust
  • sm2
NoNoJan 10, 2026
GHSA-g59m-gf8j-gjf5LOW3.7
  • RustRust
  • aws-sdk-controlcatalog
NoYesJan 08, 2026
GHSA-585q-cm62-757jLOW2
  • RustRust
  • mnl
NoNoJan 09, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management