Apache Cassandra 5.0 PrivEsc via MutualTlsAuthenticator (before 5.0.7)
CVE-2026-27314 Published on April 7, 2026

Apache Cassandra: Privilege escalation via ADD IDENTITY authorization bypass
Privilege escalation in Apache Cassandra 5.0 on an mTLS environment using MutualTlsAuthenticator allows a user with only CREATE permission to associate their own certificate identity with an arbitrary role, including a superuser role, and authenticate as that role via ADD IDENTITY. Users are recommended to upgrade to version 5.0.7+, which fixes this issue.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2026-27314 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

Privilege Defined With Unsafe Actions

A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.


Products Associated with CVE-2026-27314

Want to know whenever a new CVE is published for Apache Cassandra? stack.watch will email you.

 

Affected Versions

Apache Software Foundation Apache Cassandra: