{"id":"CVE-2026-27315","summary":"Apache Cassandra: cqlsh history sensitive information leak","details":"Sensitive Information Leak in cqlsh in Apache Cassandra 4.0 allows access to sensitive information, like passwords, from previously executed cqlsh command via  ~/.cassandra/cqlsh_history local file access.\n\nUsers are recommended to upgrade to version 4.0.20, which fixes this issue.\n\n--\nDescription: Cassandra's command-line tool, cqlsh, provides a command history feature that allows users to recall previously executed commands using the up/down arrow keys. These history records are saved in the ~/.cassandra/cqlsh_history file in the user's home directory.\n\nHowever, cqlsh does not redact sensitive information when saving command history. This means that if a user executes operations involving passwords (such as logging in or creating users) within cqlsh, these passwords are permanently stored in cleartext in the history file on the disk.","aliases":["BIT-cassandra-2026-27315","GHSA-fh34-c629-p8xj"],"modified":"2026-05-18T05:58:40.339036545Z","published":"2026-04-07T16:40:51.836Z","database_specific":{"cwe_ids":["CWE-532"],"cna_assigner":"apache","unresolved_ranges":[{"extracted_events":[{"introduced":"4.0"},{"last_affected":"4.0.19"}],"source":"AFFECTED_FIELD"}],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27315.json"},"references":[{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2026/04/07/8"},{"type":"WEB","url":"https://downloads.apache.org/cassandra/"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27315.json"},{"type":"ADVISORY","url":"https://lists.apache.org/thread/ft77zrk2mzt8qsch4g6jqjj4901d22k3"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27315"},{"type":"REPORT","url":"https://issues.apache.org/jira/browse/CASSANDRA-21180"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/cassandra","events":[{"introduced":"902b4d31772eaa84f05ffdc1e4f4b7a66d5b17e6"},{"fixed":"c48b9f011d938918c3e20dbd82e7f11bd9155193"}],"database_specific":{"extracted_events":[{"introduced":"4.0.0"},{"fixed":"4.0.20"}],"cpe":"cpe:2.3:a:apache:cassandra:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2026-27315.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}