Description
Unity Catalog is an open, multi-modal Catalog for data and AI. In 0.4.0 and earlier, a critical authentication bypass vulnerability exists in the Unity Catalog token exchange endpoint (/api/1.0/unity-control/auth/tokens). The endpoint extracts the issuer (iss) claim from incoming JWTs and uses it to dynamically fetch the JWKS endpoint for signature validation without validating that the issuer is a trusted identity provider.
Published: 2026-03-11
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass leading to User Impersonation
Action: Immediate Patch
AI Analysis

Impact

In Unity Catalog versions 0.4.0 and earlier, the token exchange endpoint (/api/1.0/unity-control/auth/tokens) retrieves the issuer (iss) claim from incoming JWTs and uses that value to dynamically fetch the corresponding JWKS endpoint for signature validation, but it does not verify that the issuer is a trusted identity provider. This omission allows an attacker to craft a JWT signed by an arbitrary issuer and successfully pass authentication, effectively impersonating any user in the system. The vulnerability is classified under CWE-1390, CWE-290, and CWE-346.

Affected Systems

The vulnerability affects the Unity Catalog product from the vendor unitycatalog. Applicable versions are 0.4.0 and any earlier releases. The affected CPE string is cpe:2.3:a:unitycatalog:unitycatalog:*:*:*:*:data:*:*:*, indicating the generic data and AI catalog platform.

Risk and Exploitability

The CVSS score of 9.1 categorizes this as a critical severity vulnerability. The EPSS score of less than 1% suggests the likelihood of exploitation is currently low, and the vulnerability is not listed in the CISA KEV catalog. While the exact attack vector is not explicitly stated in the provided data, it is inferred that an attacker would need network access to the token exchange endpoint, making it an online exploit scenario. Successful exploitation permits full user impersonation, compromising confidentiality, integrity, and potentially the availability of data services within the affected Unity Catalog deployment.

Generated by OpenCVE AI on March 16, 2026 at 23:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Unity Catalog to the latest version (0.4.1 or later) as released by the vendor.
  • Configure the token exchange endpoint to validate the issuer against a whitelist of trusted identity providers.
  • Disable or restrict access to the token exchange endpoint for untrusted networks or clients.
  • Monitor authentication logs for suspicious token exchange activity.
  • Review and apply any additional security advisories linked at https://github.com/unitycatalog/unitycatalog/security/advisories/GHSA-qqcj-rghw-829x.

Generated by OpenCVE AI on March 16, 2026 at 23:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:unitycatalog:unitycatalog:*:*:*:*:data:*:*:*

Thu, 12 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Unitycatalog
Unitycatalog unitycatalog
Vendors & Products Unitycatalog
Unitycatalog unitycatalog

Wed, 11 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description Unity Catalog is an open, multi-modal Catalog for data and AI. In 0.4.0 and earlier, a critical authentication bypass vulnerability exists in the Unity Catalog token exchange endpoint (/api/1.0/unity-control/auth/tokens). The endpoint extracts the issuer (iss) claim from incoming JWTs and uses it to dynamically fetch the JWKS endpoint for signature validation without validating that the issuer is a trusted identity provider.
Title Unity Catalog has a JWT Issuer Validation Bypass Allows Complete User Impersonation
Weaknesses CWE-1390
CWE-290
CWE-346
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Unitycatalog Unitycatalog
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-12T19:57:39.336Z

Reserved: 2026-02-19T19:46:03.540Z

Link: CVE-2026-27478

cve-icon Vulnrichment

Updated: 2026-03-12T19:57:35.846Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-11T20:16:14.810

Modified: 2026-03-16T20:24:07.223

Link: CVE-2026-27478

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:55:17Z

Weaknesses