Impact
The flaw allows a user who can create keys to bind their certificate to any role, including superuser, via ADD IDENTITY, enabling elevation of privileges to full administrative control over the Cassandra cluster.
Affected Systems
Apache Cassandra 5.0.x running in an mTLS environment that uses MutualTlsAuthenticator. Versions prior to 5.0.7 are vulnerable; upgrading to 5.0.7 or later removes the flaw.
Risk and Exploitability
This issue carries a CVSS score of 8.8, indicating a high severity. The lack of EPSS data leaves the likelihood of exploitation uncertain, but the vulnerability can be exploited by anyone with CREATE rights and the ability to use a certificate, potentially allowing an attacker to assume superuser credentials and compromise the entire cluster. The vulnerability is not listed in the KEV catalog, suggesting no widespread exploit evidence yet.
OpenCVE Enrichment
Github GHSA