CVE-2026-42812: CWE-863 Incorrect Authorization in Apache Software Foundation Apache Polaris
In Apache Iceberg, the table's metadata files are control files: they tell readers which data files belong to the table and which table version to read. `write.metadata.path` is an optional table property that tells Polaris where to write those metadata files. For a table already registered in a Polaris-managed catalog, changing only that property through an `ALTER TABLE`-style settings change (not a row-level `INSERT`, `SELECT`, `UPDATE`, or `DELETE`) bypasses the commit-time branch that is supposed to revalidate storage locations. The full persisted / credential-vending variant requires the affected catalog to have `polaris.config.allow.unstructured.table.location=true`, with `allowedLocations` broad enough to include the attacker-chosen target. `allowedLocations` is the admin-configured allowlist of storage paths that the catalog is allowed to use. Public project materials suggest that this flag is a real supported compatibility / layout mode, not just a contrived lab-only prerequisite. In that configuration, a user who can change table settings can cause Apache Polaris itself to write new table metadata to an attacker-chosen reachable storage location before the intended location-validation branch runs. If the later concrete-path validation also accepts that location, Polaris persists the resulting metadata path into stored table state. Later table-load and credential APIs can then return temporary cloud-storage credentials for the same location without revalidating it. In plain terms, Polaris can later hand out temporary storage access for the same attacker-chosen area. That attacker-chosen area does not need to be limited to the poisoned table's own files. If it is a broader storage prefix, another table's prefix, or, depending on configuration or provider behavior, even a bucket/container root, the resulting disclosure or corruption scope can extend to any data and metadata Polaris can reach there. The practical consequences are therefore similar to the staged-create credential-vending issue already discussed: data and metadata reachable in that storage scope can be exposed and, if write-capable credentials are later issued, modified, corrupted, or removed. Even before that later credential step, Polaris itself performs the metadata write to the unchecked location. So the core issue is not only later credential vending. The primary defect is that Polaris skips its intended location checks before performing a security- sensitive metadata write when only `write.metadata.path` changes. When `polaris.config.allow.unstructured.table.location=false`, current code review suggests the later `updateTableLike(...)` validation usually rejects out-of-tree metadata locations before the unsafe path is persisted. That may reduce the persisted / credential-vending variant, but it does not prevent the underlying defect: Polaris still skips the intended pre-write location check when only `write.metadata.path` changes.
AI Analysis
Technical Summary
Apache Polaris manages table metadata files that indicate which data files belong to a table and which version to read. The optional write.metadata.path property controls where Polaris writes these metadata files. Changing this property alone via ALTER TABLE settings bypasses the commit-time validation branch intended to verify storage locations. When the catalog is configured with polaris.config.allow.unstructured.table.location=true and a permissive allowedLocations setting, an attacker with table settings modification rights can cause Polaris to write metadata to arbitrary storage locations. If later validation accepts these locations, Polaris stores the metadata path and may issue temporary cloud storage credentials for that location without revalidation. This can expose or allow modification of data and metadata accessible in that storage area. The core issue is that Polaris skips intended pre-write location checks when only write.metadata.path changes. When unstructured locations are disallowed, later validation may reject unsafe locations but does not prevent the initial skipped check, leaving the underlying defect present.
Potential Impact
An attacker with permission to modify table settings can cause Apache Polaris to write metadata files to unauthorized storage locations and potentially receive temporary cloud storage credentials for those locations. This can lead to unauthorized disclosure, modification, corruption, or deletion of data and metadata within the affected storage scope. The severity is critical due to the broad impact on data confidentiality, integrity, and availability. No known exploits are reported in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict permissions to modify table settings, especially the write.metadata.path property. Review and tighten the allowedLocations configuration to limit permissible storage paths. Consider disabling polaris.config.allow.unstructured.table.location if not required. Monitor vendor communications for updates and apply patches promptly once released.
CVE-2026-42812: CWE-863 Incorrect Authorization in Apache Software Foundation Apache Polaris
Description
In Apache Iceberg, the table's metadata files are control files: they tell readers which data files belong to the table and which table version to read. `write.metadata.path` is an optional table property that tells Polaris where to write those metadata files. For a table already registered in a Polaris-managed catalog, changing only that property through an `ALTER TABLE`-style settings change (not a row-level `INSERT`, `SELECT`, `UPDATE`, or `DELETE`) bypasses the commit-time branch that is supposed to revalidate storage locations. The full persisted / credential-vending variant requires the affected catalog to have `polaris.config.allow.unstructured.table.location=true`, with `allowedLocations` broad enough to include the attacker-chosen target. `allowedLocations` is the admin-configured allowlist of storage paths that the catalog is allowed to use. Public project materials suggest that this flag is a real supported compatibility / layout mode, not just a contrived lab-only prerequisite. In that configuration, a user who can change table settings can cause Apache Polaris itself to write new table metadata to an attacker-chosen reachable storage location before the intended location-validation branch runs. If the later concrete-path validation also accepts that location, Polaris persists the resulting metadata path into stored table state. Later table-load and credential APIs can then return temporary cloud-storage credentials for the same location without revalidating it. In plain terms, Polaris can later hand out temporary storage access for the same attacker-chosen area. That attacker-chosen area does not need to be limited to the poisoned table's own files. If it is a broader storage prefix, another table's prefix, or, depending on configuration or provider behavior, even a bucket/container root, the resulting disclosure or corruption scope can extend to any data and metadata Polaris can reach there. The practical consequences are therefore similar to the staged-create credential-vending issue already discussed: data and metadata reachable in that storage scope can be exposed and, if write-capable credentials are later issued, modified, corrupted, or removed. Even before that later credential step, Polaris itself performs the metadata write to the unchecked location. So the core issue is not only later credential vending. The primary defect is that Polaris skips its intended location checks before performing a security- sensitive metadata write when only `write.metadata.path` changes. When `polaris.config.allow.unstructured.table.location=false`, current code review suggests the later `updateTableLike(...)` validation usually rejects out-of-tree metadata locations before the unsafe path is persisted. That may reduce the persisted / credential-vending variant, but it does not prevent the underlying defect: Polaris still skips the intended pre-write location check when only `write.metadata.path` changes.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Apache Polaris manages table metadata files that indicate which data files belong to a table and which version to read. The optional write.metadata.path property controls where Polaris writes these metadata files. Changing this property alone via ALTER TABLE settings bypasses the commit-time validation branch intended to verify storage locations. When the catalog is configured with polaris.config.allow.unstructured.table.location=true and a permissive allowedLocations setting, an attacker with table settings modification rights can cause Polaris to write metadata to arbitrary storage locations. If later validation accepts these locations, Polaris stores the metadata path and may issue temporary cloud storage credentials for that location without revalidation. This can expose or allow modification of data and metadata accessible in that storage area. The core issue is that Polaris skips intended pre-write location checks when only write.metadata.path changes. When unstructured locations are disallowed, later validation may reject unsafe locations but does not prevent the initial skipped check, leaving the underlying defect present.
Potential Impact
An attacker with permission to modify table settings can cause Apache Polaris to write metadata files to unauthorized storage locations and potentially receive temporary cloud storage credentials for those locations. This can lead to unauthorized disclosure, modification, corruption, or deletion of data and metadata within the affected storage scope. The severity is critical due to the broad impact on data confidentiality, integrity, and availability. No known exploits are reported in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Until an official fix is available, restrict permissions to modify table settings, especially the write.metadata.path property. Review and tighten the allowedLocations configuration to limit permissible storage paths. Consider disabling polaris.config.allow.unstructured.table.location if not required. Monitor vendor communications for updates and apply patches promptly once released.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- apache
- Date Reserved
- 2026-04-30T14:36:55.718Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69f8cb08cbff5d86103668c6
Added to database: 5/4/2026, 4:36:24 PM
Last enriched: 5/4/2026, 4:51:20 PM
Last updated: 5/4/2026, 5:38:59 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.