Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-2pxw-r47w-4p8c Privilege Escalation on Linux/MacOS
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 00:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Tue, 28 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2023-09-19'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-10-21T23:15:22.302Z

Reserved: 2023-03-15T15:59:10.053Z

Link: CVE-2023-28434

cve-icon Vulnrichment

Updated: 2024-08-02T12:38:25.275Z

cve-icon NVD

Status : Modified

Published: 2023-03-22T21:15:18.427

Modified: 2025-10-22T00:18:17.590

Link: CVE-2023-28434

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.