CVE-2026-26187
Treeverse · lakeFS
lakeFS, an open-source data versioning tool for object storage, contains a high-severity vulnerability that may affect repository security.
Executive summary
A security vulnerability in lakeFS poses a high risk to the integrity and confidentiality of data stored within Git-like object storage repositories.
Vulnerability
This vulnerability affects lakeFS, a tool designed to transform object storage into versioned repositories. The flaw is rated with a CVSS score of 8.1, indicating a High severity impact on the security operations of the data management layer, though the specific exploit vector is currently undisclosed.
Business impact
A compromise of lakeFS could allow a threat actor to manipulate data versions, delete critical datasets, or gain unauthorized access to sensitive object storage buckets (e.g., S3, GCS). With a CVSS score of 8.1, the business impact includes potential data loss, loss of data lineage, and the introduction of malicious data into production environments, which could disrupt data science and engineering workflows.
Remediation
Immediate Action: Apply the latest security patches from the lakeFS GitHub repository or official vendor distribution immediately.
Proactive Monitoring: Audit lakeFS access logs and S3/object storage logs for unauthorized API calls or unexpected data modifications.
Compensating Controls: Implement strict IAM policies on the underlying object storage to ensure that lakeFS only has the minimum necessary permissions (Principle of Least Privilege).
Exploitation status
Public Exploit Available: false
Analyst recommendation
Organizations relying on lakeFS for data versioning should treat this vulnerability as a high priority. The potential for data manipulation in a production environment is a significant risk that can only be mitigated through rapid patching. We recommend an immediate audit of lakeFS configurations following the update.