CVE-2026-44221
ArcadeDB · ArcadeDB
Authorization bypass flaws in ArcadeDB allow authenticated users to access, modify, or corrupt data and schemas across different databases on the same server.
Executive summary
An authorization bypass vulnerability in ArcadeDB allows authenticated users to perform unauthorized actions across multiple databases, compromising data isolation.
Vulnerability
This vulnerability consists of two defects: failure to initialize file access maps and improper security configuration during database creation. These issues allow an authenticated principal to bypass both record-level and database-level authorization.
Business impact
Successful exploitation allows an authenticated user to perform unauthorized read, write, and schema mutations on any database residing on the affected server. Given the 9.0 CVSS score, this represents a major risk to data integrity and multi-tenant isolation, potentially resulting in cross-database data leakage or catastrophic system-wide database corruption.
Remediation
Immediate Action: Upgrade all instances of ArcadeDB to version 2.6.4 or later immediately.
Proactive Monitoring: Audit database access logs for unusual cross-database queries or unauthorized attempts to modify database schemas.
Compensating Controls: Enforce strict database-level access controls and review API token permissions to ensure the principle of least privilege is maintained.
Exploitation status
Public Exploit Available: Not specified
Analyst recommendation
This vulnerability fundamentally breaks the security model of the database server. Administrators must ensure all instances are updated to version 2.6.4 to restore proper authorization enforcement and prevent potential unauthorized data manipulation by authenticated entities.