Skip to main content

CVE-2025-26467: CWE-267 Privilege Defined With Unsafe Actions in Apache Software Foundation Apache Cassandra

High
VulnerabilityCVE-2025-26467cvecve-2025-26467cwe-267
Published: Mon Aug 25 2025 (08/25/2025, 14:06:28 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache Cassandra

Description

Privilege Defined With Unsafe Actions vulnerability in Apache Cassandra. An user with MODIFY permission ON ALL KEYSPACES can escalate privileges to superuser within a targeted Cassandra cluster via unsafe actions to a system resource. Operators granting data MODIFY permission on all keyspaces on affected versions should review data access rules for potential breaches. This issue affects Apache Cassandra 3.0.30, 3.11.17, 4.0.16, 4.1.7, 5.0.2, but this advisory is only for 4.0.16 because the fix to CVE-2025-23015 was incorrectly applied to 4.0.16, so that version is still affected. Users in the 4.0 series are recommended to upgrade to version 4.0.17 which fixes the issue. Users from 3.0, 3.11, 4.1 and 5.0 series should follow recommendation from CVE-2025-23015.

AI-Powered Analysis

AILast updated: 09/02/2025, 01:13:08 UTC

Technical Analysis

CVE-2025-26467 is a high-severity privilege escalation vulnerability affecting Apache Cassandra, specifically version 4.0.16. The vulnerability arises from a CWE-267 issue, where privileges are defined with unsafe actions. In this case, a user granted MODIFY permission on all keyspaces within a Cassandra cluster can exploit unsafe actions on system resources to escalate their privileges to that of a superuser. This escalation allows the attacker to gain full administrative control over the Cassandra cluster, potentially compromising confidentiality, integrity, and availability of the data stored. The vulnerability is notable because it affects a critical permission level (MODIFY on all keyspaces) that might be granted to operational users or applications, and the exploit does not require user interaction. The advisory highlights that the fix for a related vulnerability (CVE-2025-23015) was incorrectly applied in version 4.0.16, leaving it vulnerable. Users are recommended to upgrade to version 4.0.17 where the issue is resolved. Other affected series (3.0, 3.11, 4.1, 5.0) should follow guidance from CVE-2025-23015. Although no known exploits are currently reported in the wild, the vulnerability’s high CVSS score (8.8) and the nature of privilege escalation make it a critical risk for organizations relying on Apache Cassandra for data storage and management.

Potential Impact

For European organizations, the impact of CVE-2025-26467 can be severe. Apache Cassandra is widely used in industries requiring scalable and highly available databases, including finance, telecommunications, healthcare, and government sectors. A successful privilege escalation attack could lead to unauthorized data access, data manipulation, or deletion, severely impacting data confidentiality and integrity. This could result in regulatory non-compliance, especially under GDPR, leading to heavy fines and reputational damage. Additionally, availability could be compromised if attackers disrupt cluster operations or delete critical data. Given the potential for superuser access, attackers could also create persistent backdoors or manipulate audit logs, complicating incident response. The vulnerability’s exploitation could affect multi-tenant environments or cloud deployments common in Europe, increasing the risk of cross-customer data breaches. The absence of required user interaction and the network attack vector (AV:N) further increase the risk of automated or remote exploitation.

Mitigation Recommendations

European organizations should take immediate and specific actions beyond generic patching advice: 1) Upgrade all Apache Cassandra 4.0 series deployments from 4.0.16 to 4.0.17 or later to apply the correct fix. For other versions (3.0, 3.11, 4.1, 5.0), follow the remediation steps outlined in CVE-2025-23015 advisories. 2) Review and audit all users and roles granted MODIFY permission on all keyspaces. Limit this permission strictly to trusted administrators and avoid broad assignments. 3) Implement strict role-based access control (RBAC) policies and segregate duties to minimize privilege exposure. 4) Monitor Cassandra audit logs for unusual privilege escalations or administrative actions, and enhance logging to detect exploitation attempts. 5) Employ network segmentation and firewall rules to restrict access to Cassandra clusters only to authorized hosts and users. 6) Conduct penetration testing and vulnerability assessments focusing on privilege escalation paths within Cassandra environments. 7) Prepare incident response plans specifically addressing potential exploitation of this vulnerability, including rapid isolation and forensic analysis capabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-02-10T23:19:36.665Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68ac70a0ad5a09ad004c3b96

Added to database: 8/25/2025, 2:18:08 PM

Last enriched: 9/2/2025, 1:13:08 AM

Last updated: 9/4/2025, 10:23:06 PM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats