GHSA-pqqf-7hxm-rj5r: Leaky JWTs in OpenMetadata exposing highly-privileged bot users
Summary
OpenMetadata leaks JWT tokens used by highly-privileged ingestion-bot accounts through API calls to `/api/v1/ingestionPipelines` for certain services (Glue, Redshift, Postgres). Any read-only user can extract these JWTs from the UI's network requests and use them to make destructive API calls, enabling privilege escalation and potential data leakage. The vulnerability was demonstrated in the Collate Sandbox by extracting an ingestion bot JWT and using it to modify database descriptions.
Solution / Mitigation
Redact jwtToken in API payload. Implement role-based filtering - Only return JWT tokens to users with explicit admin/service account permissions. (for Admins) Rotate Ingestion Bot Tokens in affected environments.
Original source: https://github.com/advisories/GHSA-pqqf-7hxm-rj5r
First tracked: February 11, 2026 at 06:00 PM