CVE-2026-27478

Source
https://cve.org/CVERecord?id=CVE-2026-27478
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27478.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-27478
Aliases
Published
2026-03-11T19:36:03.271Z
Modified
2026-04-10T05:38:26.779333Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Unity Catalog has a JWT Issuer Validation Bypass Allows Complete User Impersonation
Details

Unity Catalog is an open, multi-modal Catalog for data and AI. In 0.4.0 and earlier, a critical authentication bypass vulnerability exists in the Unity Catalog token exchange endpoint (/api/1.0/unity-control/auth/tokens). The endpoint extracts the issuer (iss) claim from incoming JWTs and uses it to dynamically fetch the JWKS endpoint for signature validation without validating that the issuer is a trusted identity provider.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-1390",
        "CWE-290",
        "CWE-346"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27478.json"
}
References

Affected packages

Git / github.com/unitycatalog/unitycatalog

Affected ranges

Type
GIT
Repo
https://github.com/unitycatalog/unitycatalog
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "0.4.0"
        }
    ]
}

Affected versions

ai-v0.*
ai-v0.3.0
v0.*
v0.4.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27478.json"