Sensitive Cookie Without "HttpOnly" Flag Affecting rucio-webui package, versions [,35.8.3)[36.0.0rc1,38.5.4)[39.0.0rc1,39.3.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (15th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-PYTHON-RUCIOWEBUI-15366647
  • published1 Mar 2026
  • disclosed25 Feb 2026
  • creditDuncan Woosley

Introduced: 25 Feb 2026

NewCVE-2026-25733  (opens in a new tab)
CWE-1004  (opens in a new tab)
CWE-79  (opens in a new tab)

How to fix?

Upgrade rucio-webui to version 35.8.3, 38.5.4, 39.3.1 or higher.

Overview

Affected versions of this package are vulnerable to Sensitive Cookie Without "HttpOnly" Flag via the comment field in the custom rules process. An attacker can execute arbitrary JavaScript in the context of the WebUI by submitting crafted input that is stored by the backend and rendered without proper output encoding when viewed by other users or administrators. This can lead to session token theft, unauthorized actions, or data exfiltration by enticing a victim to view a maliciously crafted rule.

CVSS Base Scores

version 4.0
version 3.1