Description
MinIO is a high-performance object storage system. From RELEASE.2022-11-08T05-27-07Z to before RELEASE.2026-03-17T21-25-16Z, a JWT algorithm confusion vulnerability in MinIO's OpenID Connect authentication allows an attacker who knows the OIDC ClientSecret to forge arbitrary identity tokens and obtain S3 credentials with any policy, including consoleAdmin. This issue has been patched in RELEASE.2026-03-17T21-25-16Z.
Published: 2026-03-24
Score: 9.2 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The flaw arises from a JWT algorithm confusion in MinIO’s OIDC authentication path. By knowing the OIDC ClientSecret, an attacker can fabricate identity tokens that win the token verification step and gain S3 credentials. The issued credentials can include any policy, up to consoleAdmin, giving the attacker full control over the object storage instance. This leads to complete loss of confidentiality, integrity, and availability of stored data and the administrative interface.

Affected Systems

This issue affects MinIO object storage versions between RELEASE.2022-11-08T05-27-07Z and just before RELEASE.2026-03-17T21-25-16Z. All installations of MinIO that use OpenID Connect for authentication in this period are vulnerable. Upgrade to the patched release from 2026‑03‑17 or later to eliminate the weakness.

Risk and Exploitability

The CVSS base score of 9.2 reflects a high severity, and the EPSS score indicates exploitation is unlikely (<1%). However, the vulnerability is still significant because the attacker only needs the OIDC ClientSecret, which could be leaked or accessed by an insider. The attack vector is inferred to be remote over the network, requiring access to the OIDC configuration. The CVE is not listed in the CISA KEV catalog, yet the potential for privilege escalation warrants immediate attention.

Generated by OpenCVE AI on April 8, 2026 at 20:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor-supported patch by upgrading MinIO to RELEASE.2026‑03‑17T21‑25‑16Z or a newer version.
  • If an immediate upgrade is not feasible, rotate and revoke the OIDC ClientSecret and limit its distribution to trusted services.
  • Enforce strict JWT algorithm validation by ensuring only a single algorithm, such as RS256, is accepted in the OIDC configuration.
  • Monitor authentication logs for unexpected token issuance or elevated privileges, and audit access controls regularly.

Generated by OpenCVE AI on April 8, 2026 at 20:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-5cx5-wh4m-82fh MinIO has JWT Algorithm Confusion in OIDC Authentication
History

Wed, 08 Apr 2026 19:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Wed, 25 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Minio
Minio minio
Vendors & Products Minio
Minio minio

Tue, 24 Mar 2026 19:30:00 +0000

Type Values Removed Values Added
Description MinIO is a high-performance object storage system. From RELEASE.2022-11-08T05-27-07Z to before RELEASE.2026-03-17T21-25-16Z, a JWT algorithm confusion vulnerability in MinIO's OpenID Connect authentication allows an attacker who knows the OIDC ClientSecret to forge arbitrary identity tokens and obtain S3 credentials with any policy, including consoleAdmin. This issue has been patched in RELEASE.2026-03-17T21-25-16Z.
Title MinIO: JWT Algorithm Confusion in OIDC Authentication
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 9.2, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-25T14:28:14.561Z

Reserved: 2026-03-18T21:23:36.677Z

Link: CVE-2026-33322

cve-icon Vulnrichment

Updated: 2026-03-25T14:00:25.744Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-24T20:16:27.857

Modified: 2026-04-08T19:05:00.710

Link: CVE-2026-33322

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-09T08:29:37Z

Weaknesses