LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-42810

CVE-2026-42810 - Vulnerability Analysis

CriticalCVSS: 9.9

Last Updated: May 4, 2026

Apache Polaris - Broken Access Control

Published: May 4, 2026Updated: May 4, 2026Remote Exploitable

Overview

Apache Polaris 1.4.0 contains an access control bypass caused by unescaped '*' characters in namespace and table names used in S3 IAM policies, letting attackers with crafted table names access and modify other tables' S3 data, exploit requires ability to create wildcard tables.

Severity & Score

Severity: Critical
CVSS Score: 9.9

Impact

Attackers can read, list, create, and delete data in other tables' S3 storage, leading to data disclosure and tampering.

Mitigation

Update to the latest version where S3 IAM resource patterns properly escape wildcard characters.

Details

CVE ID
CVE-2026-42810
Severity
Critical
CVSS Score
9.9
Type
broken_access_control
Status
new

CWE

  • CWE-20

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H