CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

couchbase

couchbase_server

63 known vulnerabilities · sorted by CVSS score

CVE-2019-11495
CRITICAL9.8

In Couchbase Server 5.1.1, the cookie used for intra-node communication was not generated securely. Couchbase Server uses erlang:now() to seed the PRNG which results in a small search space for potential random seeds that could then be used to brute force the cookie and execute code against a remote system. This has been fixed in version 6.0.0.

couchbase / couchbase_server
Network
Published Sep 10, 2019
Page 1 of 4
CVE-2023-49931
CRITICAL9.8

An issue was discovered in Couchbase Server before 7.2.4. SQL++ cURL calls to /diag/eval are not sufficiently restricted.

couchbase / couchbase_server
Network
Published Feb 29, 2024
CVE-2020-24719
CRITICAL9.8

Exposed Erlang Cookie could lead to Remote Command Execution (RCE) attack. Communication between Erlang nodes is done by exchanging a shared secret (aka "magic cookie"). There are cases where the magic cookie is included in the content of the logs. An attacker can use the cookie to attach to an Erlang node and run OS level commands on the system running the Erlang node. Affects version: 6.5.1. Fix version: 6.6.0.

couchbase / couchbase_server
Network
Published Nov 12, 2020
CVE-2023-49930
CRITICAL9.8

An issue was discovered in Couchbase Server before 7.2.4. cURL calls to /diag/eval are not sufficiently restricted.

couchbase / couchbase_server
Network
Published Feb 29, 2024
CVE-2021-35943
CRITICAL9.8

Couchbase Server 6.5.x and 6.6.x through 6.6.2 has Incorrect Access Control. Externally managed users are not prevented from using an empty password, per RFC4513.

couchbase / couchbase_server+1
Network
Published Sep 29, 2021
CVE-2020-9039
CRITICAL9.8

Couchbase Server 4.0.0, 4.1.0, 4.1.1, 4.5.0, 4.5.1, 4.6.0 through 4.6.5, 5.0.0, 5.1.1, 5.5.0 and 5.5.1 have Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).The /settings REST endpoint exposed by the projector process is an endpoint that administrators can use for various tasks such as updating configuration and collecting performance profiles. The endpoint was unauthenticated and has been updated to only allow authenticated users to access these administrative APIs.

couchbase / couchbase_server+9
Network
Published Feb 22, 2020
CVE-2019-11496
CRITICAL9.1

In versions of Couchbase Server prior to 5.0, the bucket named "default" was a special bucket that allowed read and write access without authentication. As part of 5.0, the behavior of all buckets including "default" were changed to only allow access by authenticated users with sufficient authorization. However, users were allowed unauthenticated and unauthorized access to the "default" bucket if the properties of this bucket were edited. This has been fixed in versions 5.1.0 and 5.5.0.

couchbase / couchbase_server
Network
Published Sep 10, 2019
CVE-2022-32559
CRITICAL9.1

An issue was discovered in Couchbase Server before 7.0.4. Random HTTP requests lead to leaked metrics.

couchbase / couchbase_server
Network
Published Jun 14, 2022
CVE-2020-9042
HIGH8.8

In Couchbase Server 6.0, credentials cached by a browser can be used to perform a CSRF attack if an administrator has used their browser to check the results of a REST API request.

couchbase / couchbase_server
Network
Published Jun 8, 2020
CVE-2024-0519
HIGH8.8

Out of bounds memory access in V8 in Google Chrome prior to 120.0.6099.224 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

google / chrome+3
Network
Published Jan 16, 2024
CVE-2023-3079
HIGH8.8

Type confusion in V8 in Google Chrome prior to 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

google / chrome+8
Network
Published Jun 5, 2023
CVE-2022-32562
HIGH8.8

An issue was discovered in Couchbase Server before 7.0.4. Operations may succeed on a collection using stale RBAC permission.

couchbase / couchbase_server
Network
Published Jun 13, 2022
CVE-2018-15728
HIGH8.8

Couchbase Server exposed the '/diag/eval' endpoint which by default is available on TCP/8091 and/or TCP/18091. Authenticated users that have 'Full Admin' role assigned could send arbitrary Erlang code to the 'diag/eval' endpoint of the API and the code would subsequently be executed in the underlying operating system with privileges of the user which was used to start Couchbase. Affects Version: 4.0.0, 4.1.2, 4.5.1, 5.0.0, 4.6.5, 5.0.1, 5.1.1, 5.5.0, 5.5.1. Fix Version: 6.0.0, 5.5.2

couchbase / couchbase_server
Network
Published Aug 24, 2018
CVE-2023-2033
HIGH8.8

Type confusion in V8 in Google Chrome prior to 112.0.5615.121 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)

google / chrome+6
Network
Published Apr 14, 2023
CVE-2023-50437
HIGH8.6

An issue was discovered in Couchbase Server before 7.2.x before 7.2.4. otpCookie is shown with full admin on pools/default/serverGroups and engageCluster2.

couchbase / couchbase_server
Network
Published Feb 29, 2024
CVE-2022-42951
HIGH8.1

An issue was discovered in Couchbase Server 6.5.x and 6.6.x before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2. During the start-up of a Couchbase Server node, there is a small window of time (before the cluster management authentication has started) where an attacker can connect to the cluster manager using default credentials.

couchbase / couchbase_server+2
Network
Published Feb 6, 2023
CVE-2025-46619
HIGH7.6

A security issue has been discovered in Couchbase Server before 7.6.4 and fixed in v.7.6.4 and v.7.2.7 for Windows that could allow unauthorized access to sensitive files. Depending on the level of privileges, this vulnerability may grant access to files such as /etc/passwd or /etc/shadow.

couchbase / couchbase_server+1
Network
Published Apr 30, 2025
CVE-2023-25016
HIGH7.5

Couchbase Server before 6.6.6, 7.x before 7.0.5, and 7.1.x before 7.1.2 exposes Sensitive Information to an Unauthorized Actor.

couchbase / couchbase_server+2
Network
Published Feb 6, 2023
CVE-2022-32558
HIGH7.5

An issue was discovered in Couchbase Server before 7.0.4. Sample bucket loading may leak internal user passwords during a failure.

couchbase / couchbase_server+4
Network
Published Jun 13, 2022
CVE-2023-36667
HIGH7.5

Couchbase Server 7.1.4 before 7.1.5 and 7.2.0 before 7.2.1 allows Directory Traversal.

couchbase / couchbase_server+1
Network
Published Nov 8, 2023