LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-31216

CVE-2026-31216 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: May 13, 2026

Nexent - Broken Access Control

Published: May 12, 2026Updated: May 13, 2026Remote Exploitable

Overview

Nexent v1.7.5.2 backend service contains an unauthorized arbitrary file deletion vulnerability caused by lack of authentication, authorization, and input validation in DELETE /storage/{object_name:path} endpoint, letting unauthenticated remote attackers delete arbitrary files, exploit requires no authentication.

Severity & Score

Severity: Critical
CVSS Score: 9.1

Impact

Unauthenticated attackers can delete arbitrary files, causing data loss and denial of service.

Mitigation

Update to the latest version with proper authentication, authorization, and input validation on DELETE /storage/{object_name:path} endpoint.

Details

CVE ID
CVE-2026-31216
Severity
Critical
CVSS Score
9.1
Type
broken_access_control
Status
unconfirmed

CWE

  • CWE-552

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H