๐Ÿ” CVE Alert

CVE-2026-27478

CRITICAL 9.1

Unity Catalog has a JWT Issuer Validation Bypass Allows Complete User Impersonation

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

Unity Catalog is an open, multi-modal Catalog for data and AI. In 0.4.0 and earlier, a critical authentication bypass vulnerability exists in the Unity Catalog token exchange endpoint (/api/1.0/unity-control/auth/tokens). The endpoint extracts the issuer (iss) claim from incoming JWTs and uses it to dynamically fetch the JWKS endpoint for signature validation without validating that the issuer is a trusted identity provider.

CWE CWE-290 CWE-346 CWE-1390
Vendor unitycatalog
Product unitycatalog
Published Mar 11, 2026
Last Updated Mar 12, 2026
Stay Ahead of the Next One

Get instant alerts for unitycatalog unitycatalog

Be the first to know when new critical vulnerabilities affecting unitycatalog unitycatalog are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

unitycatalog / unitycatalog
<= 0.4.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/unitycatalog/unitycatalog/security/advisories/GHSA-qqcj-rghw-829x