PT-2026-37317 · Maven · Com.Arcadedb:Arcadedb-Server

Published

2026-05-05

·

Updated

2026-05-05

·

CVE-2026-44221

CVSS v3.1

9.0

Critical

VectorAV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

Impact

Authenticated users and API tokens scoped to a specific database could read, write, and mutate schema on any other database on the same server. Two distinct defects contributed: (1) ServerSecurityUser.getDatabaseUser() returned a DB user with an uninitialized fileAccessMap, which requestAccessOnFile treated as allow-all; (2) ArcadeDBServer.createDatabase() omitted factory.setSecurity(...) so any database created via POST /api/v1/server {"command":"create database X"} had its entire record-level authorization system silently disabled. In combination, record-level and database-level authorization could be bypassed by any authenticated principal.

Patches

Upgrade to version 26.4.2

Resources

Fix

Incorrect Authorization

Weakness Enumeration

Related Identifiers

CVE-2026-44221
GHSA-FXC7-FM93-6Q77

Affected Products

Com.Arcadedb:Arcadedb-Server