couchbase CVE Vulnerabilities & Metrics

Focus on couchbase vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About couchbase Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with couchbase. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total couchbase CVEs: 59
Earliest CVE date: 24 Aug 2018, 19:29 UTC
Latest CVE date: 19 Sep 2024, 19:15 UTC

Latest CVE reference: CVE-2024-25673

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -80.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -80.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical couchbase CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 3.82

Max CVSS: 10.0

Critical CVEs (≥9): 2

CVSS Range vs. Count

Range Count
0.0-3.9 22
4.0-6.9 30
7.0-8.9 5
9.0-10.0 2

CVSS Distribution Chart

Top 5 Highest CVSS couchbase CVEs

These are the five CVEs with the highest CVSS scores for couchbase, sorted by severity first and recency.

All CVEs for couchbase

CVE-2024-25673 couchbase vulnerability CVSS: 0 19 Sep 2024, 19:15 UTC

Couchbase Server 7.6.x before 7.6.2, 7.2.x before 7.2.6, and all earlier versions allows HTTP Host header injection.

CVE-2024-37034 couchbase vulnerability CVSS: 0 26 Jul 2024, 22:15 UTC

An issue was discovered in Couchbase Server before 7.2.5 and 7.6.0 before 7.6.1. It does not ensure that credentials are negotiated with the Key-Value (KV) service using SCRAM-SHA when remote link encryption is configured for Half-Secure.

CVE-2024-23302 couchbase vulnerability CVSS: 0 29 Feb 2024, 01:44 UTC

Couchbase Server before 7.2.4 has a private key leak in goxdcr.log.

CVE-2023-49930 couchbase vulnerability CVSS: 0 29 Feb 2024, 01:41 UTC

An issue was discovered in Couchbase Server before 7.2.4. cURL calls to /diag/eval are not sufficiently restricted.

CVE-2023-45874 couchbase vulnerability CVSS: 0 29 Feb 2024, 01:41 UTC

An issue was discovered in Couchbase Server through 7.2.2. A data reader may cause a denial of service (outage of reader threads).

CVE-2023-50782 couchbase vulnerability CVSS: 0 05 Feb 2024, 21:15 UTC

A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

CVE-2024-0519 couchbase vulnerability CVSS: 0 16 Jan 2024, 22:15 UTC

Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVE-2023-36667 couchbase vulnerability CVSS: 0 08 Nov 2023, 22:15 UTC

Couchbase Server 7.1.4 before 7.1.5 and 7.2.0 before 7.2.1 allows Directory Traversal.

CVE-2023-45875 couchbase vulnerability CVSS: 0 08 Nov 2023, 21:15 UTC

An issue was discovered in Couchbase Server 7.2.0. There is a private key leak in debug.log while adding a pre-7.0 node to a 7.2 cluster.

CVE-2023-3079 couchbase vulnerability CVSS: 0 05 Jun 2023, 22:15 UTC

Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVE-2023-2033 couchbase vulnerability CVSS: 0 14 Apr 2023, 19:15 UTC

Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

CVE-2023-28470 couchbase vulnerability CVSS: 0 23 Mar 2023, 01:15 UTC

In Couchbase Server 5 through 7 before 7.1.4, the nsstats endpoint is accessible without authentication.

CVE-2023-25016 couchbase vulnerability CVSS: 0 06 Feb 2023, 21:15 UTC

Couchbase Server before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2 exposes Sensitive Information to an Unauthorized Actor.

CVE-2022-42951 couchbase vulnerability CVSS: 0 06 Feb 2023, 21:15 UTC

An issue was discovered in Couchbase Server 6.5.x and 6.6.x before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2. During the start-up of a Couchbase Server node, there is a small window of time (before the cluster management authentication has started) where an attacker can connect to the cluster manager using default credentials.

CVE-2022-42950 couchbase vulnerability CVSS: 0 06 Feb 2023, 21:15 UTC

An issue was discovered in Couchbase Server 7.x before 7.0.5 and 7.1.x before 7.1.2. A crafted HTTP REST request from an administrator account to the Couchbase Server Backup Service can exhaust memory resources, causing the process to be killed, which can be used for denial of service.

CVE-2022-32556 couchbase vulnerability CVSS: 0 21 Jul 2022, 12:15 UTC

An issue was discovered in Couchbase Server before 7.0.4. A private key is leaked to the log files with certain crashes.

CVE-2022-34826 couchbase vulnerability CVSS: 0 15 Jul 2022, 12:15 UTC

In Couchbase Server 7.1.x before 7.1.1, an encrypted Private Key passphrase may be leaked in the logs.

CVE-2022-33911 couchbase vulnerability CVSS: 5.0 12 Jul 2022, 14:15 UTC

An issue was discovered in Couchbase Server 7.x before 7.0.4. Field names are not redacted in logged validation messages for Analytics Service. An Unauthorized Actor may be able to obtain Sensitive Information.

CVE-2022-33173 couchbase vulnerability CVSS: 5.0 12 Jul 2022, 14:15 UTC

An algorithm-downgrade issue was discovered in Couchbase Server before 7.0.4. Analytics Remote Links may temporarily downgrade to non-TLS connection to determine the TLS port number, using SCRAM-SHA instead.

CVE-2022-32561 couchbase vulnerability CVSS: 3.5 14 Jun 2022, 17:15 UTC

An issue was discovered in Couchbase Server before 6.6.5 and 7.x before 7.0.4. Previous mitigations for CVE-2018-15728 were found to be insufficient when it was discovered that diagnostic endpoints could still be accessed from the network.

CVE-2022-32559 couchbase vulnerability CVSS: 6.4 14 Jun 2022, 17:15 UTC

An issue was discovered in Couchbase Server before 7.0.4. Random HTTP requests lead to leaked metrics.

CVE-2022-32557 couchbase vulnerability CVSS: 5.0 14 Jun 2022, 17:15 UTC

An issue was discovered in Couchbase Server before 7.0.4. The Index Service does not enforce authentication for TCP/TLS servers.

CVE-2022-32565 couchbase vulnerability CVSS: 5.0 13 Jun 2022, 23:15 UTC

An issue was discovered in Couchbase Server before 7.0.4. The Backup Service log leaks unredacted usernames and document ids.

CVE-2022-32562 couchbase vulnerability CVSS: 6.5 13 Jun 2022, 23:15 UTC

An issue was discovered in Couchbase Server before 7.0.4. Operations may succeed on a collection using stale RBAC permission.

CVE-2022-32192 couchbase vulnerability CVSS: 5.0 13 Jun 2022, 23:15 UTC

Couchbase Server 5.x through 7.x before 7.0.4 exposes Sensitive Information to an Unauthorized Actor.

CVE-2022-32564 couchbase vulnerability CVSS: 5.0 13 Jun 2022, 21:15 UTC

An issue was discovered in Couchbase Server before 7.0.4. In couchbase-cli, server-eshell leaks the Cluster Manager cookie.

CVE-2022-32560 couchbase vulnerability CVSS: 5.0 13 Jun 2022, 21:15 UTC

An issue was discovered in Couchbase Server before 7.0.4. XDCR lacks role checking when changing internal settings.

CVE-2022-32558 couchbase vulnerability CVSS: 5.0 13 Jun 2022, 21:15 UTC

An issue was discovered in Couchbase Server before 7.0.4. Sample bucket loading may leak internal user passwords during a failure.

CVE-2022-32193 couchbase vulnerability CVSS: 3.5 13 Jun 2022, 21:15 UTC

Couchbase Server 6.6.x through 7.x before 7.0.4 exposes Sensitive Information to an Unauthorized Actor.

CVE-2022-32563 couchbase vulnerability CVSS: 6.8 10 Jun 2022, 12:15 UTC

An issue was discovered in Couchbase Sync Gateway 3.x before 3.0.2. Admin credentials are not verified when using X.509 client-certificate authentication from Sync Gateway to Couchbase Server. When Sync Gateway is configured to authenticate with Couchbase Server using X.509 client certificates, the admin credentials provided to the Admin REST API are ignored, resulting in privilege escalation for unauthenticated users. The Public REST API is not impacted by this issue. A workaround is to replace X.509 certificate based authentication with Username and Password authentication inside the bootstrap configuration.

CVE-2021-33504 couchbase vulnerability CVSS: 4.0 02 Jun 2022, 14:15 UTC

Couchbase Server before 7.1.0 has Incorrect Access Control.

CVE-2022-31022 couchbase vulnerability CVSS: 2.1 01 Jun 2022, 20:15 UTC

Bleve is a text indexing library for go. Bleve includes HTTP utilities under bleve/http package, that are used by its sample application. These HTTP methods pave way for exploitation of a node’s filesystem where the bleve index resides, if the user has used bleve’s own HTTP (bleve/http) handlers for exposing the access to the indexes. For instance, the CreateIndexHandler (`http/index_create.go`) and DeleteIndexHandler (`http/index_delete.go`) enable an attacker to create a bleve index (directory structure) anywhere where the user running the server has the write permissions and to delete recursively any directory owned by the same user account. Users who have used the bleve/http package for exposing access to bleve index without the explicit handling for the Role Based Access Controls(RBAC) of the index assets would be impacted by this issue. There is no patch for this issue because the http package is purely intended to be used for demonstration purposes. Bleve was never designed handle the RBACs, nor it was ever advertised to be used in that way. The collaborators of this project have decided to stay away from adding any authentication or authorization to bleve project at the moment. The bleve/http package is mainly for demonstration purposes and it lacks exhaustive validation of the user inputs as well as any authentication and authorization measures. It is recommended to not use bleve/http in production use cases.

CVE-2022-26311 couchbase vulnerability CVSS: 5.0 10 Mar 2022, 17:47 UTC

Couchbase Operator 2.2.x before 2.2.3 exposes Sensitive Information to an Unauthorized Actor. Secrets are not redacted in logs collected from Kubernetes environments.

CVE-2021-43963 couchbase vulnerability CVSS: 5.5 07 Dec 2021, 22:15 UTC

An issue was discovered in Couchbase Sync Gateway 2.7.0 through 2.8.2. The bucket credentials used to read and write data in Couchbase Server were insecurely being stored in the metadata within sync documents written to the bucket. Users with read access could use these credentials to obtain write access. (This issue does not affect clusters where Sync Gateway is authenticated with X.509 client certificates. This issue also does not affect clusters where shared bucket access is not enabled on Sync Gateway.)

CVE-2021-42763 couchbase vulnerability CVSS: 5.0 02 Nov 2021, 12:15 UTC

Couchbase Server before 6.6.3 and 7.x before 7.0.2 stores Sensitive Information in Cleartext. The issue occurs when the cluster manager forwards a HTTP request from the pluggable UI (query workbench etc) to the specific service. In the backtrace, the Basic Auth Header included in the HTTP request, has the "@" user credentials of the node processing the UI request.

CVE-2021-37842 couchbase vulnerability CVSS: 5.0 02 Nov 2021, 12:15 UTC

metakv in Couchbase Server 7.0.0 uses Cleartext for Storage of Sensitive Information. Remote Cluster XDCR credentials can get leaked in debug logs. Config key tombstone purging was added in Couchbase Server 7.0.0. This issue happens when a config key, which is being logged, has a tombstone purger time-stamp attached to it.

CVE-2021-35945 couchbase vulnerability CVSS: 5.0 29 Sep 2021, 20:15 UTC

Couchbase Server 6.5.x, 6.6.0 through 6.6.2, and 7.0.0, has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.

CVE-2021-35944 couchbase vulnerability CVSS: 5.0 29 Sep 2021, 20:15 UTC

Couchbase Server 6.5.x, 6.6.x through 6.6.2, and 7.0.0 has a Buffer Overflow. A specially crafted network packet sent from an attacker can crash memcached.

CVE-2021-35943 couchbase vulnerability CVSS: 7.5 29 Sep 2021, 20:15 UTC

Couchbase Server 6.5.x and 6.6.x through 6.6.2 has Incorrect Access Control. Externally managed users are not prevented from using an empty password, per RFC4513.

CVE-2021-25643 couchbase vulnerability CVSS: 4.0 26 May 2021, 21:15 UTC

An issue was discovered in Couchbase Server 5.x and 6.x before 6.5.2 and 6.6.x before 6.6.2. Internal users with administrator privileges, @cbq-engine-cbauth and @index-cbauth, leak credentials in cleartext in the indexer.log file when they make a /listCreateTokens, /listRebalanceTokens, or /listMetadataTokens call.

CVE-2021-27924 couchbase vulnerability CVSS: 4.3 19 May 2021, 20:15 UTC

An issue was discovered in Couchbase Server 6.x through 6.6.1. The Couchbase Server UI is insecurely logging session cookies in the logs. This allows for the impersonation of a user if the log files are obtained by an attacker before a session cookie expires.

CVE-2021-31158 couchbase vulnerability CVSS: 4.0 19 May 2021, 19:15 UTC

In the Query Engine in Couchbase Server 6.5.x and 6.6.x through 6.6.1, Common Table Expression queries were not correctly checking the user's permissions, allowing read-access to resources beyond what those users were explicitly allowed to access.

CVE-2021-27925 couchbase vulnerability CVSS: 3.5 19 May 2021, 19:15 UTC

An issue was discovered in Couchbase Server 6.5.x and 6.6.x through 6.6.1. When using the View Engine and Auditing is enabled, a crash condition can (depending on a race condition) cause an internal user with administrator privileges, @ns_server, to have its credentials leaked in cleartext in the ns_server.info.log file.

CVE-2021-25644 couchbase vulnerability CVSS: 5.0 19 May 2021, 19:15 UTC

An issue was discovered in Couchbase Server 5.x and 6.x through 6.6.1 and 7.0.0 Beta. Incorrect commands to the REST API can result in leaked authentication information being stored in cleartext in the debug.log and info.log files, and is also shown in the UI visible to administrators.

CVE-2021-25645 couchbase vulnerability CVSS: 2.1 10 May 2021, 13:15 UTC

An issue was discovered in Couchbase Server before 6.0.5, 6.1.x through 6.5.x before 6.5.2, and 6.6.x before 6.6.1. An internal user with administrator privileges, @ns_server, leaks credentials in cleartext in the cbcollect_info.log, debug.log, ns_couchdb.log, indexer.log, and stats.log files. NOTE: updating the product does not automatically address leaks that occurred in the past.

CVE-2020-24719 couchbase vulnerability CVSS: 10.0 12 Nov 2020, 21:15 UTC

Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.

CVE-2020-9042 couchbase vulnerability CVSS: 6.8 08 Jun 2020, 16:15 UTC

In Couchbase Server 6.0, credentials cached by a browser can be used to perform a CSRF attack if an administrator has used their browser to check the results of a REST API request.

CVE-2020-9041 couchbase vulnerability CVSS: 5.0 08 Jun 2020, 16:15 UTC

In Couchbase Server 6.0.3 and Couchbase Sync Gateway through 2.7.0, the Cluster management, views, query, and full-text search endpoints are vulnerable to the Slowloris denial-of-service attack because they don't more aggressively terminate slow connections.

CVE-2020-9040 couchbase vulnerability CVSS: 5.0 08 Jun 2020, 16:15 UTC

Couchbase Server Java SDK before 2.7.1.1 allows a potential attacker to forge an SSL certificate and pose as the intended peer. An attacker can leverage this flaw by crafting a cryptographically valid certificate that will be accepted by Java SDK's Netty component due to missing hostname verification.

CVE-2020-9039 couchbase vulnerability CVSS: 7.5 22 Feb 2020, 02:15 UTC

Couchbase Server 4.0.0, 4.1.0, 4.1.1, 4.5.0, 4.5.1, 4.6.0 through 4.6.5, 5.0.0, 5.1.1, 5.5.0 and 5.5.1 have Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).The /settings REST endpoint exposed by the projector process is an endpoint that administrators can use for various tasks such as updating configuration and collecting performance profiles. The endpoint was unauthenticated and has been updated to only allow authenticated users to access these administrative APIs.

CVE-2019-11497 couchbase vulnerability CVSS: 5.0 10 Sep 2019, 18:15 UTC

In Couchbase Server 5.0.0, when an invalid Remote Cluster Certificate was entered as part of the reference creation, XDCR did not parse and check the certificate signature. It then accepted the invalid certificate and attempted to use it to establish future connections to the remote cluster. This has been fixed in version 5.5.0. XDCR now checks the validity of the certificate thoroughly and prevents a remote cluster reference from being created with an invalid certificate.

CVE-2019-11496 couchbase vulnerability CVSS: 6.4 10 Sep 2019, 18:15 UTC

In versions of Couchbase Server prior to 5.0, the bucket named "default" was a special bucket that allowed read and write access without authentication. As part of 5.0, the behavior of all buckets including "default" were changed to only allow access by authenticated users with sufficient authorization. However, users were allowed unauthenticated and unauthorized access to the "default" bucket if the properties of this bucket were edited. This has been fixed in versions 5.1.0 and 5.5.0.

CVE-2019-11495 couchbase vulnerability CVSS: 7.5 10 Sep 2019, 18:15 UTC

In Couchbase Server 5.1.1, the cookie used for intra-node communication was not generated securely. Couchbase Server uses erlang:now() to seed the PRNG which results in a small search space for potential random seeds that could then be used to brute force the cookie and execute code against a remote system. This has been fixed in version 6.0.0.

CVE-2019-11467 couchbase vulnerability CVSS: 7.8 10 Sep 2019, 18:15 UTC

In Couchbase Server 4.6.3 and 5.5.0, secondary indexing encodes the entries to be indexed using collatejson. When index entries contain certain characters like \t, <, >, it caused buffer overrun as encoded string would be much larger than accounted for, causing indexer service to crash and restart. This has been remedied in versions 5.1.2 and 5.5.2 to ensure buffer always grows as needed for any input.

CVE-2019-11466 couchbase vulnerability CVSS: 5.0 10 Sep 2019, 18:15 UTC

In Couchbase Server 6.0.0 and 5.5.0, the eventing service exposes system diagnostic profile via an HTTP endpoint that does not require credentials on a port earmarked for internal traffic only. This has been remedied in version 6.0.1 and now requires valid credentials to access.

CVE-2019-11465 couchbase vulnerability CVSS: 5.0 10 Sep 2019, 17:15 UTC

An issue was discovered in Couchbase Server 5.5.x through 5.5.3 and 6.0.0. The Memcached "connections" stat block command emits a non-redacted username. The system information submitted to Couchbase as part of a bug report included the usernames for all users currently logged into the system even if the log was redacted for privacy. This has been fixed (in 5.5.4 and 6.0.1) so that usernames are tagged properly in the logs and are hashed out when the logs are redacted.

CVE-2019-11464 couchbase vulnerability CVSS: 4.3 10 Sep 2019, 17:15 UTC

Some enterprises require that REST API endpoints include security-related headers in REST responses. Headers such as X-Frame-Options and X-Content-Type-Options are generally advisable, however some information security professionals additionally look for X-Permitted-Cross-Domain-Policies and X-XSS-Protection, which are more generally applicable to HTML endpoint, to be included too. These headers were not included in Couchbase Server 5.5.0 and 5.1.2 . They are now included in version 6.0.2 in responses from the Couchbase Server Views REST API (port 8092).

CVE-2019-9039 couchbase vulnerability CVSS: 7.5 26 Jun 2019, 19:15 UTC

In Couchbase Sync Gateway 2.1.2, an attacker with access to the Sync Gateway’s public REST API was able to issue additional N1QL statements and extract sensitive data or call arbitrary N1QL functions through the parameters "startkey" and "endkey" on the "_all_docs" endpoint. By issuing nested queries with CPU-intensive operations they may have been able to cause increased resource usage and denial of service conditions. The _all_docs endpoint is not required for Couchbase Mobile replication and external access to this REST endpoint has been blocked to mitigate this issue. This issue has been fixed in versions 2.5.0 and 2.1.3.

CVE-2018-15728 couchbase vulnerability CVSS: 9.0 24 Aug 2018, 19:29 UTC

Couchbase Server exposed the '/diag/eval' endpoint which by default is available on TCP/8091 and/or TCP/18091. Authenticated users that have 'Full Admin' role assigned could send arbitrary Erlang code to the 'diag/eval' endpoint of the API and the code would subsequently be executed in the underlying operating system with privileges of the user which was used to start Couchbase. Affects Version: 4.0.0, 4.1.2, 4.5.1, 5.0.0, 4.6.5, 5.0.1, 5.1.1, 5.5.0, 5.5.1. Fix Version: 6.0.0, 5.5.2