CVE-2026-34214

Trino is a distributed SQL query engine for big data analytics. From version 439 to before version 480, Iceberg connector REST catalog static credentials (access key) or vended credentials (temporary access key) are accessible to users that have write privilege on SQL level. This issue has been patched in version 480.
Configurations

Configuration 1 (hide)

cpe:2.3:a:trino:trino:*:*:*:*:*:*:*:*

History

06 Apr 2026, 16:53

Type Values Removed Values Added
CPE cpe:2.3:a:trino:trino:*:*:*:*:*:*:*:*
First Time Trino trino
Trino
References () https://github.com/trinodb/trino/releases/tag/480 - () https://github.com/trinodb/trino/releases/tag/480 - Release Notes
References () https://github.com/trinodb/trino/security/advisories/GHSA-x27p-5f68-m644 - () https://github.com/trinodb/trino/security/advisories/GHSA-x27p-5f68-m644 - Vendor Advisory

31 Mar 2026, 15:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-31 15:16

Updated : 2026-04-06 16:53


NVD link : CVE-2026-34214

Mitre link : CVE-2026-34214

CVE.ORG link : CVE-2026-34214


JSON object : View

Products Affected

trino

  • trino
CWE
CWE-212

Improper Removal of Sensitive Information Before Storage or Transfer

CWE-312

Cleartext Storage of Sensitive Information