<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>ArcadeData — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/arcadedata/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 22:22:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/arcadedata/feed.xml" rel="self" type="application/rss+xml"/><item><title>ArcadeDB Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-arcadedb-auth-bypass/</link><pubDate>Tue, 05 May 2026 22:22:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-arcadedb-auth-bypass/</guid><description>ArcadeDB versions prior to 26.4.2 are vulnerable to an authorization bypass, allowing authenticated users and API tokens scoped to a specific database to read, write, and mutate schema on any other database on the same server, and disabling the record-level authorization system for newly created databases.</description><content:encoded><![CDATA[<p>ArcadeDB, a multi-model database, is susceptible to an authorization bypass vulnerability affecting versions prior to 26.4.2. This vulnerability stems from two distinct defects: first, the <code>ServerSecurityUser.getDatabaseUser()</code> method returns a database user with an uninitialized file access map, which is then incorrectly interpreted as allowing all access. Second, the <code>ArcadeDBServer.createDatabase()</code> method omits the <code>factory.setSecurity(...)</code> call, effectively disabling the record-level authorization system for any database created via the API endpoint <code>POST /api/v1/server {&quot;command&quot;:&quot;create database X&quot;}</code>.  This combination of flaws allows authenticated principals to bypass both record-level and database-level authorization constraints.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the ArcadeDB server with valid credentials for a specific database.</li>
<li>The attacker leverages the <code>ServerSecurityUser.getDatabaseUser()</code> flaw to gain unauthorized access to other databases.</li>
<li>The attacker exploits the uninitialized <code>fileAccessMap</code> vulnerability, allowing them to bypass file access checks.</li>
<li>The attacker crafts a request to read data from a database they should not have access to, such as <code>GET /api/v1/database/OtherDatabase/query/sql/SELECT%20*%20FROM%20SomeTable</code>.</li>
<li>The server incorrectly authorizes the request due to the flawed access control mechanisms.</li>
<li>The attacker then attempts to modify the schema of another database using API calls that would normally be restricted based on database-level permissions. For example, <code>POST /api/v1/database/OtherDatabase {&quot;command&quot;:&quot;alter database X&quot;}</code>.</li>
<li>If an attacker creates a new database using <code>POST /api/v1/server {&quot;command&quot;:&quot;create database X&quot;}</code>, the record-level authorization system is disabled due to the missing <code>factory.setSecurity(...)</code> call.</li>
<li>The attacker then exploits the newly created database, which has no security checks, gaining complete control over its data and schema.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthorized access to sensitive data stored in other databases within the same ArcadeDB server. An attacker can read, write, and modify data across multiple databases, leading to potential data breaches, data corruption, and complete system compromise. Organizations using affected versions of ArcadeDB are at risk of significant data loss and reputational damage.  The vulnerability affects all deployments using versions prior to 26.4.2.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade ArcadeDB server to version 26.4.2 to patch CVE-2026-44221 and resolve the authorization bypass vulnerability.</li>
<li>Monitor web server logs for unusual API requests targeting multiple databases from a single authenticated user to detect potential exploitation attempts, and deploy the provided Sigma rule <code>Detect ArcadeDB Database Access from Different IPs</code> to detect this activity.</li>
<li>Implement rate limiting on API endpoints to mitigate potential brute-force attacks aimed at exploiting this vulnerability and use <code>Detect ArcadeDB Unsecured Database Creation</code> Sigma rule to detect unauthorized database creation.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authorization bypass</category><category>privilege escalation</category><category>cve-2026-44221</category></item></channel></rss>