This is an automated email from the ASF dual-hosted git repository.

vgalaxies pushed a commit to branch VGalaxies-patch-1
in repository https://gitbox.apache.org/repos/asf/incubator-hugegraph-doc.git


The following commit(s) were added to refs/heads/VGalaxies-patch-1 by this push:
     new 593b146e Update security.md with new CVE entries
593b146e is described below

commit 593b146e98433e91a55beba1a769196379829e66
Author: VGalaxies <[email protected]>
AuthorDate: Fri Dec 12 14:08:02 2025 +0800

    Update security.md with new CVE entries
    
    Added new CVE entries for HugeGraph vulnerabilities.
---
 content/en/docs/guides/security.md | 2 ++
 1 file changed, 2 insertions(+)

diff --git a/content/en/docs/guides/security.md 
b/content/en/docs/guides/security.md
index 5fde7137..4ce21102 100644
--- a/content/en/docs/guides/security.md
+++ b/content/en/docs/guides/security.md
@@ -29,6 +29,8 @@ The general process for handling security vulnerabilities is 
as follows:
 
 - [CVE-2024-27348](https://www.cve.org/CVERecord?id=CVE-2024-27348): 
HugeGraph-Server - Command execution in gremlin
 - [CVE-2024-27349](https://www.cve.org/CVERecord?id=CVE-2024-27349): 
HugeGraph-Server - Bypass whitelist in Auth mode
+- [CVE-2024-43441](https://www.cve.org/CVERecord?id=CVE-2024-43441): 
HugeGraph-Server - Fixed JWT Token (Secret)
+- [CVE-2025-26866](https://www.cve.org/CVERecord?id=CVE-2025-26866): 
HugeGraph-Server - RAFT and deserialization vulnerability
 
 ### HugeGraph-Toolchain project (Hubble/Loader/Client/Tools/..)
 

Reply via email to