Description
Missing MinIO policy cleanup on bucket deletion via Apache CloudStack allows users to retain access to buckets which they previously owned. If another user creates a new bucket with the same name, the previous owners can gain unauthorized read and write access to it by using the previously generated access and secret keys.

Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.
Published: 2026-05-08
Score: 8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Apache CloudStack fails to delete the MinIO policy that is tied to a bucket when that bucket is removed. The residual policy continues to allow the original owner’s access keys to work against any bucket that later inherits the same name, granting read and write privileges to a new owner. This is a "Removal at deletion" flaw (CWE‑459) that can compromise confidentiality and integrity of data stored in MinIO. The impact is a persistent, unauthorized access to the object storage that can be used to exfiltrate or modify data.

Affected Systems

The vulnerability affects Apache CloudStack versions prior to 4.20.3.0 and 4.22.0.1, as distributed by the Apache Software Foundation. All deployments integrating MinIO as the object store are impacted until the patch is applied.

Risk and Exploitability

The CVSS score of 8.0 indicates high severity. The EPSS score is not available, so current exploitation likelihood is unknown, but the vulnerability is not listed in CISA KEV. Attackers likely need internal access to the CloudStack management interface to delete a bucket and then create a new one with the same name, implying an internal or privileged compromise vector. Once the scenario is set up, the residual keys provide continuous unauthorized access without further action from the attacker.

Generated by OpenCVE AI on May 8, 2026 at 15:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor patch by upgrading Apache CloudStack to version 4.20.3.0, 4.22.0.1, or later to ensure MinIO policies are removed upon bucket deletion.
  • Revoke any legacy access and secret keys that may still be active from buckets deleted prior to the patch to prevent unauthorized reuse.
  • Review and enforce MinIO bucket naming conventions and lifecycle policies to detect and prevent accidental reuse of bucket names across different users.

Generated by OpenCVE AI on May 8, 2026 at 15:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 07:30:00 +0000

Type Values Removed Values Added
References

Fri, 08 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 08 May 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache cloudstack
Vendors & Products Apache
Apache cloudstack

Fri, 08 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description Missing MinIO policy cleanup on bucket deletion via Apache CloudStack allows users to retain access to buckets which they previously owned. If another user creates a new bucket with the same name, the previous owners can gain unauthorized read and write access to it by using the previously generated access and secret keys. Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.
Title Apache CloudStack: MinIO policy remains intact on bucket deletion
Weaknesses CWE-459
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H'}


Subscriptions

Apache Cloudstack
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-09T06:43:02.627Z

Reserved: 2025-12-02T12:29:57.723Z

Link: CVE-2025-66467

cve-icon Vulnrichment

Updated: 2026-05-09T06:43:02.627Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-05-08T13:16:35.720

Modified: 2026-05-09T07:16:08.640

Link: CVE-2025-66467

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T15:45:08Z

Weaknesses