<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>OpenMetadata — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/openmetadata/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 21 May 2026 16:37:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/openmetadata/feed.xml" rel="self" type="application/rss+xml"/><item><title>OpenMetadata TEST_CONNECTION Workflow Leaks JWT and Database Password</title><link>https://feed.craftedsignal.io/briefs/2026-05-openmetadata-jwt-leak/</link><pubDate>Thu, 21 May 2026 16:37:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-openmetadata-jwt-leak/</guid><description>OpenMetadata version 1.12.1 is vulnerable to an information disclosure issue where a non-admin user can trigger a TEST_CONNECTION workflow for a Database Service and receive the cleartext database password and the ingestion bot JWT in the HTTP response, enabling privilege escalation.</description><content:encoded><![CDATA[<p>OpenMetadata version 1.12.1 is vulnerable to an information disclosure vulnerability where a non-admin SSO user can trigger a <code>TEST_CONNECTION</code> workflow for a Database Service. The HTTP 201 response to the <code>POST /api/v1/automations/workflows</code> request inadvertently includes both the cleartext database password within <code>request.connection.config.password</code> and the ingestion bot JWT within <code>openMetadataServerConnection.securityConfig.jwtToken</code>. This vulnerability allows an attacker to obtain sensitive credentials and impersonate the ingestion bot. The leaked JWT can be reused to access sensitive APIs, such as <code>GET /api/v1/services/databaseServices/{id}?include=all</code>, effectively granting bot-level privileges to unauthorized users. This issue differs from GHSA-pqqf-7hxm-rj5r as it specifically affects the <code>automations/workflows</code> TEST_CONNECTION endpoint.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated SSO user with access to the OpenMetadata UI navigates to a Database Service.</li>
<li>The user opens the connection tab of the Database Service and initiates the &ldquo;Test connection&rdquo; action.</li>
<li>The UI sends a <code>POST</code> request to <code>/api/v1/automations/workflows</code> with a JSON payload containing connection details. The password field in the request is masked.</li>
<li>The OpenMetadata server responds with an HTTP 201 status code, including the cleartext database password in the <code>request.connection.config.password</code> field of the response body.</li>
<li>The server response also includes a valid JWT for the <code>ingestion-bot</code> account in the <code>openMetadataServerConnection.securityConfig.jwtToken</code> field.</li>
<li>The attacker extracts the leaked ingestion-bot JWT from the server response.</li>
<li>The attacker reuses the leaked JWT in the <code>Authorization</code> header of subsequent API requests.</li>
<li>The attacker sends a <code>GET</code> request to <code>/api/v1/services/databaseServices/{id}?include=all</code> to retrieve the full database service details, including the username and password, confirming bot-level access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows any user capable of running the &ldquo;Test connection&rdquo; workflow to recover both the database credentials in cleartext and a long-lived ingestion-bot JWT. This enables the attacker to act as the ingestion-bot, gaining unauthorized access to modify services and metadata within the OpenMetadata system. The severity is high, because successful credential access allows immediate escalation of privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade OpenMetadata to version 1.12.4 or later to patch CVE-2026-46481.</li>
<li>Deploy the Sigma rule &ldquo;Detect OpenMetadata TEST_CONNECTION Workflow Password Leak&rdquo; to identify attempts to exploit this vulnerability by monitoring for HTTP 201 responses from the /api/v1/automations/workflows endpoint that include password information.</li>
<li>Rotate all ingestion-bot JWTs to invalidate any previously leaked tokens.</li>
<li>Implement proper secret management using the Secrets Store, ensuring sensitive information is not exposed in API responses.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>openmetadata</category><category>information-disclosure</category><category>jwt-leak</category><category>credential-access</category></item></channel></rss>