Cyber Posture

CVE-2025-26511

High

Published: 13 February 2025

Published
13 February 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.5th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.

Security Summary

CVE-2025-26511 is a privilege escalation vulnerability in the Instaclustr fork of Stratio's Cassandra-Lucene-Index plugin, affecting versions 4.0-rc1-1.0.0 through 4.0.16-1.0.0 and 4.1.2-1.0.0 through 4.1.8-1.0.0 when installed into Apache Cassandra 4.x. Published on 2025-02-13, it stems from incorrect authorization (CWE-863), enabling authenticated users to bypass role-based access control (RBAC). The issue carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Attackers require only low-privileged authenticated access to Cassandra (PR:L) and can exploit the flaw remotely over the network (AV:N) with low attack complexity (AC:L) and no user interaction (UI:N). Successful exploitation allows bypassing RBAC to escalate privileges, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U).

The Instaclustr security advisory (GHSA-mrqp-q7vx-v2cx) and patch commit (44ab4b639c9354a6335f40b1cf6178c745c6e101) at https://github.com/instaclustr/cassandra-lucene-index provide mitigation guidance, including upgrading to fixed versions beyond the affected ranges.

Details

CWE(s)
CWE-863

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The CVE describes a privilege escalation vulnerability due to incorrect authorization allowing RBAC bypass in the Cassandra plugin, directly enabling T1068 Exploitation for Privilege Escalation.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References