CVE-2026-42810 - Vulnerability Analysis
CriticalCVSS: 9.9Last Updated: May 4, 2026
Apache Polaris - Broken Access Control
Published: May 4, 2026Updated: May 4, 2026Remote Exploitable
Overview
Apache Polaris 1.4.0 contains an access control bypass caused by unescaped '*' characters in namespace and table names used in S3 IAM policies, letting attackers with crafted table names access and modify other tables' S3 data, exploit requires ability to create wildcard tables.
Severity & Score
Severity: Critical
CVSS Score: 9.9
Impact
Attackers can read, list, create, and delete data in other tables' S3 storage, leading to data disclosure and tampering.
Mitigation
Update to the latest version where S3 IAM resource patterns properly escape wildcard characters.
References
Related Resources
Details
- CVE ID
- CVE-2026-42810
- Severity
- Critical
- CVSS Score
- 9.9
- Type
- broken_access_control
- Status
- new
CWE
- CWE-20
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H