This page lists critical alerts and advisories for Couchbase.

Stay informed about the latest critical alerts and advisories for Couchbase Server by subscribing to our update notifications. To sign up, please register on our support site and follow this article: Announcements – Couchbase Support

Enterprise Security Alerts

July 2025

Credential Disclosure Vulnerability in Sync Gateway Log Collection Process

A security vulnerability was identified in Sync Gateway that, in certain situations, resulted in the unintentional disclosure of credentials associated with log collection for support. This affected the set of credentials used to initiate the log collection process. We recommend upgrading to Sync Gateway 3.2.6, which addresses this issue, and rotating any credentials that were used to initiate log collection during the affected period.

Products: Couchbase Sync Gateway
Impact: Medium (6.5)
Affects Version:

3.2.5,
3.2.4,
3.2.3,
3.2.2,
3.2.1,
3.2.0,
3.1.x,
3.0.x

Fix Version:

3.2.6

June 2025

.NET SDK v3.7.1 and prior could skip certificate hostname verification

In .NET SDK v3.7.1 and earlier, hostname verification for TLS certificates was not properly enforced in all cases.

Products: Couchbase .NET SDK
Impact: Medium (4.9)
Affects Version:

3.7.0,
3.6.x,
3.5.x,
3.4.x,
3.3.x,
3.2.x,
3.1.x,
3.0.x

Fix Version:

3.7.1

May 2025

Upgrade Bouncy Castle to 1.79

An issue was discovered in Bouncy Castle Java Cryptography APIs before 1.78. An Ed25519 verification code infinite loop can occur via a crafted signature and public key.

Products: Couchbase Server
Impact: Medium (6.9)
Affects Version:

Server
7.6.5,
7.6.4,
7.6.3,
7.6.2,
7.6.1,
7.6.0,
7.2.6,
7.2.5,
7.2.4,
7.2.3,
7.2.2,
7.2.1,
7.2.0,
7.1.x,
7.0.x,
6.x

Fix Version:

Server
7.6.6,
7.2.7

April 2025

Local File Inclusion Vulnerability identified in Couchbase Server for Windows

A security issue has been discovered in Couchbase Server for Windows that could allow unauthorized access to sensitive files on the system. Depending on the level of privileges, this vulnerability may grant access to files such as / etc / passwd or / etc / shadow.

Products: Couchbase Server
Impact: High (8.7)
Affects Version:

Server
7.6.3,
7.6.2,
7.6.1,
7.6.0,
7.2.6,
7.2.5,
7.2.4,
7.2.3,
7.2.2,
7.2.1,
7.2.0,
7.1.x,
7.0.x,
6.x,
5.x,
4.x,
3.x,
2.x

Fix Version:

Server
7.6.4,
7.2.7

April 2025

Update JDK to 17.0.13

This vulnerability is challenging to exploit but allows an unauthenticated attacker with network access via multiple protocols to potentially compromise the affected products. Successful exploitation could result in unauthorized updates, insertions, or deletions of accessible data, as well as unauthorized read access to certain data subsets.

Products: Couchbase Server
Impact: Medium (4.8)
Affects Version:

Server
7.6.3,
7.6.2,
7.6.1,
7.6.0,
7.2.6,
7.2.5,
7.2.4,
7.2.3,
7.2.2,
7.2.1,
7.2.0,
7.1.x,
7.0.x,
6.x

Fix Version:

Server
7.6.4,
7.2.7

December 2024

Unauthorized creation of a user with elevated roles

A user with the security_admin_local role could create a new user in a group that has the ‘admin’ role, potentially granting elevated privileges beyond intended permissions.

Products: Couchbase Server
Impact: Medium (6.9)
Affects Version:

Server
7.6.3,
7.6.2,
7.6.1,
7.6.0

Fix Version:

Server
7.6.4

Start building

Check out our developer portal to explore NoSQL, browse resources, and get started with tutorials.

Capella-Icon

Use Capella free

Get hands-on with Couchbase in just a few clicks. Capella DBaaS is the easiest and fastest way to get started.

Get in touch

Want to learn more about Couchbase offerings? Let us help.