Description
Apache Polaris accepts literal `*` characters in namespace and table names. When it
later builds temporary S3 access policies for delegated table access, those
same characters appear to be reused unescaped in S3 IAM resource patterns
and
`s3:prefix` conditions.



In S3 IAM policy matching, `*` is treated as a wildcard rather than as
ordinary text. That means temporary credentials issued for one crafted table
can match the storage path of a different table.



In private testing against Polaris 1.4.0 using Polaris' AWS S3 temporary-
credential path on both MinIO and real AWS S3, credentials returned for
crafted tables such as `f*.t1`, `f*.*`, `*.*`, and `foo.*` could reach other
tables' S3 locations.


The confirmed behavior includes:


- reading another table's metadata control file ([Iceberg metadata JSON]);

- listing another table's exact S3 table prefix ([table prefix]);

- and, when write delegation was returned for the crafted table, creating
and
deleting an object under another table's exact S3 table prefix.



A control case using ordinary different names did not allow the same
cross-table access.



A least-privilege AWS S3 variant was also confirmed in which the attacker
principal had no Polaris permissions on the victim table and only the
minimal permissions required to create and use a crafted wildcard table
(namespace-scoped `TABLE_CREATE` and `TABLE_WRITE_DATA` on `*`). In that
setup, direct Polaris access to `foo.t1` remained forbidden, but the
attacker
could still create and load `*.*`, receive delegated S3 credentials, and use
those credentials to list, read, create, and delete objects under `foo.t1`.



In Iceberg, the metadata JSON file is a control file: it tells readers which
data files belong to the table, which snapshots exist, and which table
version
to read. So unauthorized access to it is already a meaningful
confidentiality
problem. The confirmed write-capable variant means the issue is not limited
to
disclosure.
Published: 2026-05-04
Score: 9.4 Critical
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Apache Polaris accepts literal `*` characters in namespace and table names. When it later builds temporary S3 access policies for delegated table access, those same characters appear reused unescaped in S3 IAM resource patterns and `s3:prefix` conditions. In S3 IAM policy matching, `*` is treated as a wildcard rather than ordinary text. That means temporary credentials issued for one crafted table can match the storage path of a different table. This allows an attacker to read another table's metadata file, list its S3 prefix, and when write delegation is returned, create and delete objects under that table.

Affected Systems

The vulnerability affects Apache Polaris, specifically versions tested at 1.4.0. Any deployment that allows users to create tables or namespaces with wildcard characters in names is susceptible, regardless of whether the underlying S3 storage uses AWS or MinIO. Users must review their Polaris deployments to determine if wildcard table creation is enabled.

Risk and Exploitability

The CVSS score of 9.4 classifies this as critical. The EPSS score is not available, and the vulnerability is not yet listed in CISA’s KEV catalog. Exploitation requires an authenticated user who has permission to create namespace‑scoped tables with wildcard names. The attack path involves creating a crafted table name (e.g., `f*.t1` or `*.*`), receiving the resulting short‑lived S3 credentials from Polaris, and then using those credentials to access or modify objects in an unrelated table’s bucket. Because the vulnerability hinges on unescaped `*` characters in IAM resource patterns, it can be leveraged to escape directory boundaries and attain read or write access to any S3 location governed by the generated policy.

Generated by OpenCVE AI on May 4, 2026 at 19:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Deploy a version of Apache Polaris that contains the fix as released by the Apache Software Foundation; check the project's release notes for an update that addresses invalid wildcard handling in S3 policies.
  • Restrict or remove the ability for users to create tables or namespaces with wildcard characters; enforce strict validation of namespace and table names in the Polaris configuration or at the application layer to reject literal `*` characters.
  • Apply least‑privilege S3 bucket policies to ensure that temporary credentials can access only the specific prefixes intended for a given table; consider tightening the `s3:prefix` condition or disabling temporary credential issuance if not required.
  • Monitor S3 access logs and Polaris audit logs for unexpected wildcard‑based access patterns and take corrective action if anomalies are detected.

Generated by OpenCVE AI on May 4, 2026 at 19:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache polaris
Vendors & Products Apache
Apache polaris

Mon, 04 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 May 2026 18:30:00 +0000

Type Values Removed Values Added
References

Mon, 04 May 2026 17:15:00 +0000

Type Values Removed Values Added
Description Apache Polaris accepts literal `*` characters in namespace and table names. When it later builds temporary S3 access policies for delegated table access, those same characters appear to be reused unescaped in S3 IAM resource patterns and `s3:prefix` conditions. In S3 IAM policy matching, `*` is treated as a wildcard rather than as ordinary text. That means temporary credentials issued for one crafted table can match the storage path of a different table. In private testing against Polaris 1.4.0 using Polaris' AWS S3 temporary- credential path on both MinIO and real AWS S3, credentials returned for crafted tables such as `f*.t1`, `f*.*`, `*.*`, and `foo.*` could reach other tables' S3 locations. The confirmed behavior includes: - reading another table's metadata control file ([Iceberg metadata JSON]); - listing another table's exact S3 table prefix ([table prefix]); - and, when write delegation was returned for the crafted table, creating and deleting an object under another table's exact S3 table prefix. A control case using ordinary different names did not allow the same cross-table access. A least-privilege AWS S3 variant was also confirmed in which the attacker principal had no Polaris permissions on the victim table and only the minimal permissions required to create and use a crafted wildcard table (namespace-scoped `TABLE_CREATE` and `TABLE_WRITE_DATA` on `*`). In that setup, direct Polaris access to `foo.t1` remained forbidden, but the attacker could still create and load `*.*`, receive delegated S3 credentials, and use those credentials to list, read, create, and delete objects under `foo.t1`. In Iceberg, the metadata JSON file is a control file: it tells readers which data files belong to the table, which snapshots exist, and which table version to read. So unauthorized access to it is already a meaningful confidentiality problem. The confirmed write-capable variant means the issue is not limited to disclosure.
Title Apache Polaris: could broaden vended S3 credentials through wildcard-bearing namespace or table names
Weaknesses CWE-116
CWE-20
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-04T18:33:09.056Z

Reserved: 2026-04-30T14:22:36.663Z

Link: CVE-2026-42810

cve-icon Vulnrichment

Updated: 2026-05-04T17:37:04.202Z

cve-icon NVD

Status : Received

Published: 2026-05-04T17:16:26.493

Modified: 2026-05-04T18:16:32.683

Link: CVE-2026-42810

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T19:44:00Z

Weaknesses