RustFS is a distributed object storage system built in Rust. Prior to version 1.0.0-alpha.79, he `ImportIam` admin API validates permissions using `ExportIAMAction` instead of `ImportIAMAction`, allowing a principal with export-only IAM permissions to perform import operations. Since importing IAM data performs privileged write actions (creating/updating users, groups, policies, and service accounts), this can lead to unauthorized IAM modification and privilege escalation. Version 1.0.0-alpha.79 fixes the issue.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vcwh-pff9-64cc RustFS has IAM Incorrect Authorization in ImportIam that Allows Privilege Escalation
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Rustfs
Rustfs rustfs
Vendors & Products Rustfs
Rustfs rustfs

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 15:15:00 +0000

Type Values Removed Values Added
Description RustFS is a distributed object storage system built in Rust. Prior to version 1.0.0-alpha.79, he `ImportIam` admin API validates permissions using `ExportIAMAction` instead of `ImportIAMAction`, allowing a principal with export-only IAM permissions to perform import operations. Since importing IAM data performs privileged write actions (creating/updating users, groups, policies, and service accounts), this can lead to unauthorized IAM modification and privilege escalation. Version 1.0.0-alpha.79 fixes the issue.
Title RustFS has IAM Incorrect Authorization in ImportIam that Allows Privilege Escalation
Weaknesses CWE-285
CWE-863
References
Metrics cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:P'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-08T15:54:51.896Z

Reserved: 2026-01-05T22:30:38.720Z

Link: CVE-2026-22042

cve-icon Vulnrichment

Updated: 2026-01-08T15:50:49.143Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-08T15:15:45.443

Modified: 2026-01-08T18:08:18.457

Link: CVE-2026-22042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-09T13:24:56Z

Weaknesses