CVE-2026-27315
Apache Cassandra vulnerability analysis and mitigation

Sensitive Information Leak in cqlsh in Apache Cassandra 4.0 allows access to sensitive information, like passwords, from previously executed cqlsh command via  ~/.cassandra/cqlsh_history local file access.

Users are recommended to upgrade to version 4.0.20, which fixes this issue.

-- Description: Cassandra's command-line tool, cqlsh, provides a command history feature that allows users to recall previously executed commands using the up/down arrow keys. These history records are saved in the ~/.cassandra/cqlsh_history file in the user's home directory.

However, cqlsh does not redact sensitive information when saving command history. This means that if a user executes operations involving passwords (such as logging in or creating users) within cqlsh, these passwords are permanently stored in cleartext in the history file on the disk.


SourceNVD

Related Apache Cassandra vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-27314HIGH8.8
  • Apache CassandraApache Cassandra
  • org.apache.cassandra:cassandra-all
NoYesApr 07, 2026
CVE-2025-26467HIGH8.8
  • Apache CassandraApache Cassandra
  • cassandra-4.0
NoYesAug 25, 2025
CVE-2026-32588MEDIUM6.5
  • Apache CassandraApache Cassandra
  • cpe:2.3:a:apache:cassandra
NoYesApr 07, 2026
CVE-2026-27315MEDIUM5.5
  • Apache CassandraApache Cassandra
  • cpe:2.3:a:apache:cassandra
NoYesApr 07, 2026
CVE-2025-24860MEDIUM5.4
  • Apache CassandraApache Cassandra
  • cpe:2.3:a:apache:cassandra
NoYesFeb 04, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management