including a superuser role, and authenticate as that role via ADD IDENTITY.
Users are recommended to upgrade to version 5.0.7+, which fixes this issue.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qxpc-96fq-wwmg | Apache Cassandra is vulnerable to privilege escalation in an mTLS environment using MutualTlsAuthenticator |
Wed, 15 Apr 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:* |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache cassandra |
|
| Vendors & Products |
Apache
Apache cassandra |
Tue, 07 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
cvssV3_1
|
Tue, 07 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Privilege escalation in Apache Cassandra 5.0 on an mTLS environment using MutualTlsAuthenticator allows a user with only CREATE permission to associate their own certificate identity with an arbitrary role, including a superuser role, and authenticate as that role via ADD IDENTITY. Users are recommended to upgrade to version 5.0.7+, which fixes this issue. | |
| Title | Apache Cassandra: Privilege escalation via ADD IDENTITY authorization bypass | |
| Weaknesses | CWE-267 | |
| References |
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2026-04-08T03:55:52.335Z
Reserved: 2026-02-19T00:03:57.862Z
Link: CVE-2026-27314
Updated: 2026-04-07T17:25:57.687Z
Status : Analyzed
Published: 2026-04-07T17:16:27.693
Modified: 2026-04-15T15:48:53.273
Link: CVE-2026-27314
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:47:52Z
Github GHSA