{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-34214","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-03-26T15:57:52.324Z","datePublished":"2026-03-31T14:14:47.982Z","dateUpdated":"2026-03-31T14:28:53.287Z"},"containers":{"cna":{"title":"Trino: Iceberg REST catalog static and vended credentials are accessible via query JSON","problemTypes":[{"descriptions":[{"cweId":"CWE-212","lang":"en","description":"CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-312","lang":"en","description":"CWE-312: Cleartext Storage of Sensitive Information","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/trinodb/trino/security/advisories/GHSA-x27p-5f68-m644","tags":["x_refsource_CONFIRM"],"url":"https://github.com/trinodb/trino/security/advisories/GHSA-x27p-5f68-m644"},{"name":"https://github.com/trinodb/trino/releases/tag/480","tags":["x_refsource_MISC"],"url":"https://github.com/trinodb/trino/releases/tag/480"}],"affected":[{"vendor":"trinodb","product":"trino","versions":[{"version":">= 439, < 480","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-03-31T14:14:47.982Z"},"descriptions":[{"lang":"en","value":"Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have write privilege on SQL level. This issue has been patched in version 480."}],"source":{"advisory":"GHSA-x27p-5f68-m644","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-31T14:28:47.033694Z","id":"CVE-2026-34214","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-31T14:28:53.287Z"}}]}}