CVE-2026-31216 — Unauthenticated arbitrary MinIO object delete in nexent storage API

MITRE service request: 1987825

Status: RESERVED (pending a qualifying public reference per CNA Rules §5.3).

Official CVE description

The nexent v1.7.5.2 backend service contains an unauthorized arbitrary storage file deletion vulnerability in its file management API. The DELETE /storage/{object_name:path} endpoint lacks authentication, authorization, and input validation mechanisms. Unauthenticated remote attackers can send crafted requests with a user-controlled object_name path parameter to delete arbitrary files from the underlying MinIO storage system. Successful exploitation leads to data loss and denial of service.

Summary

The storage microservice exposes DELETE /storage/{object_name:path} where object_name may include slashes, effectively letting anonymous callers delete arbitrary object keys in the configured bucket. The call chain (remove_storage_filedelete_file_implattachment_db.delete_file → MinIO delete_object) never verifies caller identity or object ownership.

Affected product and versions

Technical details

Risk

Critical for deployments exposing the API to untrusted networks. Primary impact is integrity and availability (mass data deletion).

Remediation / workaround