Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-qqcj-rghw-829x | Unity Catalog has a JWT Issuer Validation Bypass tht Allows Complete User Impersonation |
Mon, 16 Mar 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:unitycatalog:unitycatalog:*:*:*:*:data:*:*:* |
Thu, 12 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Unitycatalog
Unitycatalog unitycatalog |
|
| Vendors & Products |
Unitycatalog
Unitycatalog unitycatalog |
Wed, 11 Mar 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Unity Catalog is an open, multi-modal Catalog for data and AI. In 0.4.0 and earlier, a critical authentication bypass vulnerability exists in the Unity Catalog token exchange endpoint (/api/1.0/unity-control/auth/tokens). The endpoint extracts the issuer (iss) claim from incoming JWTs and uses it to dynamically fetch the JWKS endpoint for signature validation without validating that the issuer is a trusted identity provider. | |
| Title | Unity Catalog has a JWT Issuer Validation Bypass Allows Complete User Impersonation | |
| Weaknesses | CWE-1390 CWE-290 CWE-346 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-12T19:57:39.336Z
Reserved: 2026-02-19T19:46:03.540Z
Link: CVE-2026-27478
Updated: 2026-03-12T19:57:35.846Z
Status : Analyzed
Published: 2026-03-11T20:16:14.810
Modified: 2026-03-16T20:24:07.223
Link: CVE-2026-27478
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:55:17Z
Github GHSA