CVE-2026-32588
Authenticated DoS via CQL in Apache Cassandra 4.x Causes Latency
Publication date: 2026-04-07
Last updated on: 2026-04-15
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | cassandra | From 4.0.0 (inc) to 4.0.20 (exc) |
| apache | cassandra | From 4.1.0 (inc) to 4.1.11 (exc) |
| apache | cassandra | From 5.0.0 (inc) to 5.0.7 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-400 | The product does not properly control the allocation and maintenance of a limited resource. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability involves an authenticated denial-of-service condition caused by repeated password changes via ALTER ROLE commands over CQL in Apache Cassandra.
To detect exploitation attempts on your system, monitor for unusually high latencies or performance degradation related to CQL queries, especially those involving ALTER ROLE commands.
You can use Cassandra's query logs or audit logs to identify frequent ALTER ROLE commands executed by authenticated users.
While no specific commands are provided in the resources, a general approach could include:
- Checking Cassandra logs for repeated ALTER ROLE commands: grep or search for 'ALTER ROLE' in system logs.
- Monitoring query latencies using Cassandra's nodetool or metrics tools to detect spikes in query execution times.
- Using CQLSH or other CQL clients to review user role changes or audit trails if enabled.
Upgrading to fixed versions (4.0.20, 4.1.11, 5.0.7) is recommended to mitigate this issue.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.
Can you explain this vulnerability to me?
This vulnerability is an authenticated Denial of Service (DoS) issue in Apache Cassandra versions 4.0, 4.1, and 5.0. It allows an authenticated user to increase query latencies by repeatedly changing their password via the Cassandra Query Language (CQL).
How can this vulnerability impact me? :
The impact of this vulnerability is that an authenticated user can degrade the performance of the Cassandra database by causing increased query latencies. This can lead to slower response times and potentially disrupt normal database operations, effectively causing a Denial of Service condition.
What immediate steps should I take to mitigate this vulnerability?
Users are recommended to upgrade Apache Cassandra to versions 4.0.20, 4.1.11, or 5.0.7, which fix this issue.