CVE-2026-42810: Apache Polaris S3 Wildcard Vulnerability Creates Critical Data Risk
The National Vulnerability Database (NVD) has detailed CVE-2026-42810, a critical flaw in Apache Polaris that allows literal * characters in namespace and table names. This seemingly innocuous feature becomes a major security hole when Polaris generates temporary S3 access policies. Instead of treating * as a literal character, S3 IAM policy matching interprets it as a wildcard, leading to significant privilege escalation. This means temporary credentials issued for a specially crafted table can grant access to the storage paths of other tables.
NVD reports that private testing against Polaris 1.4.0 on both MinIO and AWS S3 confirmed this behavior. Credentials for crafted tables like f*.t1, f*.*, *.*, and foo.* could access other tables’ S3 locations. This includes reading sensitive Iceberg metadata JSON files, listing exact S3 table prefixes, and, critically, creating and deleting objects under another table’s S3 prefix when write delegation was enabled. This isn’t just a disclosure risk; it’s a full data integrity nightmare. The NVD highlights a least-privilege scenario where an attacker with minimal permissions to create a wildcard table could still gain unauthorized read/write access to unrelated tables.
This vulnerability, with a CVSS score of 9.9 (CRITICAL), underscores a fundamental misconfiguration in how Polaris translates user-supplied input into security policies. The issue stems from improper neutralization of special elements (CWE-116) and improper input validation (CWE-20). For defenders, this means assuming that any Polaris deployment handling S3 data is at risk until patched. The attacker’s calculus is simple: exploit a system’s trust in its own policy generation to bypass intended access controls and gain broad, unauthorized access to data.
What This Means For You
- If your organization uses Apache Polaris for data management, especially with S3, you need to immediately assess your exposure to CVE-2026-42810. This isn't theoretical; it allows full read/write access to other tables' data. Prioritize patching to a fixed version as soon as one is available. Until then, review and restrict permissions for creating tables, particularly those with wildcard characters. Audit S3 access logs for any anomalous access patterns, especially those originating from Polaris-delegated credentials, and investigate any tables using `*` in their names.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-42810: Apache Polaris S3 Wildcard Namespace/Table Access
title: CVE-2026-42810: Apache Polaris S3 Wildcard Namespace/Table Access
id: scw-2026-05-04-ai-1
status: experimental
level: critical
description: |
Detects attempts to exploit CVE-2026-42810 by crafting table names with wildcards ('*') in the request to Apache Polaris. This specific pattern targets the vulnerability where '*' is treated as a wildcard in S3 IAM resource patterns, allowing unauthorized access to other tables' data.
author: SCW Feed Engine (AI-generated)
date: 2026-05-04
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-42810/
tags:
- attack.lateral_movement
- attack.t1568.002
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/api/v1/namespaces/'
cs-uri-query|contains:
- 'tableName=*'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-42810 | Vulnerability | CVE-2026-42810 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 04, 2026 at 20:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.