Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. io.unitycatalog/unitycatalog-server
  4. ›
  5. CVE-2026-27478

CVE-2026-27478: Unity Catalog has a JWT Issuer Validation Bypass tht Allows Complete User Impersonation

May 11, 2026

Context: A critical authentication bypass vulnerability exists in the Unity Catalog token exchange endpoint (/api/1.0/unity-control/auth/tokens). The endpoint extracts the issuer (iss) claim from incoming JWTs and uses it to dynamically fetch the JWKS endpoint for signature validation without validating that the issuer is a trusted identity provider.

Way to exploit:

An attacker can exploit this by:

  1. Hosting their own OIDC-compliant server with a valid JWKS endpoint
  2. Signing a JWT with their own private key, setting the iss claim to their server
  3. Setting the sub/email claim to any known user in the Unity Catalog system
  4. Exchanging this crafted token for a valid internal access token

This results in complete impersonation of any user in the system, granting access to all catalogs, schemas, tables, and other resources that user has permissions to.

Additionally, the implementation does not validate the audience (aud) claim, allowing tokens intended for other services to be used.

Example

Example implementation doing token exchange with a self hosted .well-known/openid-configuration and jwks endpoint.

This can be run with python3 main.py and TARGET_USER, UC_SERVER and PORT adjusted to the testing setup.

References

  • github.com/advisories/GHSA-qqcj-rghw-829x
  • github.com/unitycatalog/unitycatalog
  • github.com/unitycatalog/unitycatalog/releases/tag/v0.4.1
  • github.com/unitycatalog/unitycatalog/security/advisories/GHSA-qqcj-rghw-829x
  • nvd.nist.gov/vuln/detail/CVE-2026-27478

Code Behaviors & Features

Detect and mitigate CVE-2026-27478 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.4.1

Fixed versions

  • 0.4.1

Solution

Upgrade to version 0.4.1 or above.

Impact 9.1 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-1390: Weak Authentication
  • CWE-290: Authentication Bypass by Spoofing
  • CWE-346: Origin Validation Error

Source file

maven/io.unitycatalog/unitycatalog-server/CVE-2026-27478.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 12 May 2026 00:19:11 +0000.