fkie_cve-2025-26467
Vulnerability from fkie_nvd
Published
2025-08-25 14:15
Modified
2025-08-26 21:14
Severity ?
Summary
Privilege Defined With Unsafe Actions vulnerability in Apache Cassandra. An user with MODIFY permission ON ALL KEYSPACES can escalate privileges to superuser within a targeted Cassandra cluster via unsafe actions to a system resource. Operators granting data MODIFY permission on all keyspaces on affected versions should review data access rules for potential breaches.
This issue affects Apache Cassandra 3.0.30, 3.11.17, 4.0.16, 4.1.7, 5.0.2, but this advisory is only for 4.0.16 because the fix to CVE-2025-23015 was incorrectly applied to 4.0.16, so that version is still affected.
Users in the 4.0 series are recommended to upgrade to version 4.0.17 which fixes the issue. Users from 3.0, 3.11, 4.1 and 5.0 series should follow recommendation from CVE-2025-23015.
References
▼ | URL | Tags | |
---|---|---|---|
security@apache.org | https://lists.apache.org/thread/xxj36rr4d6mzyqpld05dn8b9951hfpz7 | Mailing List, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", "matchCriteriaId": "7EBD1031-1C25-4CAC-B773-6947C69DB7FB", "versionEndExcluding": "3.0.31", "versionStartIncluding": "3.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1A7CA11-3152-459B-ABF3-33A6186205AC", "versionEndExcluding": "3.11.18", "versionStartIncluding": "3.11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF9E8816-7D3F-427F-A2A4-30256F19C0CB", "versionEndExcluding": "4.0.17", "versionStartIncluding": "4.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", "matchCriteriaId": "B436C4E3-A38B-42E4-AFF4-C057BE7E156C", "versionEndExcluding": "4.1.8", "versionStartIncluding": "4.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BFBF10F-8408-495D-99E6-AE122CDD87CC", "versionEndExcluding": "5.0.3", "versionStartIncluding": "5.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Privilege Defined With Unsafe Actions vulnerability in Apache Cassandra. An user with MODIFY permission ON ALL KEYSPACES can escalate privileges to superuser within a targeted Cassandra cluster via unsafe actions to a system resource. Operators granting data MODIFY permission on all keyspaces on affected versions should review data access rules for potential breaches.\n\n\n\nThis issue affects Apache Cassandra 3.0.30, 3.11.17, 4.0.16, 4.1.7, 5.0.2, but this advisory is only for 4.0.16 because the fix to CVE-2025-23015 was incorrectly applied to 4.0.16, so that version is still affected.\n\nUsers in the 4.0 series are recommended to upgrade to version 4.0.17 which fixes the issue. Users from 3.0, 3.11, 4.1 and 5.0 series should follow recommendation from CVE-2025-23015." }, { "lang": "es", "value": "Vulnerabilidad de privilegios definidos con acciones inseguras en Apache Cassandra. Un usuario con permiso MODIFICAR en TODOS LOS ESPACIOS DE TECLAS puede escalar privilegios a superusuario dentro de un cl\u00faster de Cassandra objetivo mediante acciones inseguras en un recurso del sistema. Los operadores que otorgan permiso MODIFICAR datos en todos los espacios de claves de las versiones afectadas deben revisar las reglas de acceso a datos para detectar posibles infracciones. Este problema afecta a Apache Cassandra 3.0.30, 3.11.17, 4.0.16, 4.1.7 y 5.0.2, pero este aviso solo aplica a la versi\u00f3n 4.0.16 porque la correcci\u00f3n a CVE-2025-23015 se aplic\u00f3 incorrectamente a la 4.0.16, por lo que dicha versi\u00f3n sigue afectada. Se recomienda a los usuarios de la serie 4.0 actualizar a la versi\u00f3n 4.0.17, que corrige el problema. Los usuarios de las series 3.0, 3.11, 4.1 y 5.0 deben seguir la recomendaci\u00f3n de CVE-2025-23015." } ], "id": "CVE-2025-26467", "lastModified": "2025-08-26T21:14:41.723", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-08-25T14:15:30.103", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/xxj36rr4d6mzyqpld05dn8b9951hfpz7" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-267" } ], "source": "security@apache.org", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…