CVE-2026-44501 PUBLISHED

DataHub OIDC REDIRECT_URL Cookie Deserialization Vulnerability

Assigner: GitHub_M
Reserved: 06.05.2026 Published: 14.05.2026 Updated: 14.05.2026

DataHub is an open-source metadata platform. Prior to 1.5.0.3, The DataHub frontend (datahub-frontend-react) deserializes attacker-controlled Java objects from the REDIRECT_URL HTTP cookie during the OIDC callback flow, with no integrity protection (no HMAC, no encryption). This is a Deserialization of Untrusted Data vulnerability (CWE-502) affecting the GET /callback/oidc endpoint. Successful exploitation requires a valid user account in the configured OIDC identity provider This vulnerability is fixed in 1.5.0.3.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS Score: 4.3

Product Status

Vendor datahub-project
Product datahub
Versions
  • Version < 1.5.0.3 is affected

References

Problem Types

  • CWE-502: Deserialization of Untrusted Data CWE