Description
MinIO is a high-performance object storage system. Prior to version RELEASE.2026-03-26T21-24-40Z, a flaw in extractMetadataFromMime() allows any authenticated user with s3:PutObject permission to inject internal server-side encryption metadata into objects by sending crafted X-Minio-Replication-* headers on a normal PutObject request. This issue has been patched in version RELEASE.2026-03-26T21-24-40Z.
Published: 2026-03-31
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Encryption Metadata Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a flaw in MinIO’s metadata extraction routine, allowing an authenticated user with s3:PutObject rights to embed arbitrary server‑side encryption (SSE) metadata into stored objects by supplying specially crafted X‑MinIO‑Replication‑* headers on a normal PutObject request. This injection can alter how the object is encrypted or stored, potentially exposing data or degrading security guarantees. The weakness aligns with access control bypass via improper input validation (CWE‑287).

Affected Systems

MinIO object storage systems prior to the release dated 2026‑03‑26T21‑24‑40Z are affected. The vendor is MinIO, and any deployment using older releases that have not applied the patch is at risk. Users running the patched RELEASE.2026‑03‑26T21‑24‑40Z or later are not vulnerable.

Risk and Exploitability

The CVSS base score of 7.1 indicates high severity, while the EPSS score is unavailable, suggesting uncertainty about current exploitation frequency. The vulnerability is not listed in CISA’s KEV catalog, implying no confirmed widespread exploitation. Attackers can exploit this flaw by authenticating to the S3 API and sending a PutObject request containing malicious replication headers; no additional attacker privileges are required beyond PutObject rights. Consequently, any user granted s3:PutObject in an environment where MinIO is exposed, even if not an administrator, can potentially perform the injection.

Generated by OpenCVE AI on April 1, 2026 at 06:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade MinIO to RELEASE.2026‑03‑26T21‑24‑40Z or a later patched release.
  • Verify that the running version is at least the patched release by checking the server’s version endpoint.
  • If an immediate upgrade is not feasible, restrict PutObject permissions to trusted users and audit for unauthorized replication headers.
  • Regularly review MinIO security advisories and apply updates promptly.

Generated by OpenCVE AI on April 1, 2026 at 06:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-3rh2-v3gr-35p9 MinIO is Vulnerable to SSE Metadata Injection via Replication Headers
History

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
First Time appeared Minio
Minio minio
Vendors & Products Minio
Minio minio

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Description MinIO is a high-performance object storage system. Prior to version RELEASE.2026-03-26T21-24-40Z, a flaw in extractMetadataFromMime() allows any authenticated user with s3:PutObject permission to inject internal server-side encryption metadata into objects by sending crafted X-Minio-Replication-* headers on a normal PutObject request. This issue has been patched in version RELEASE.2026-03-26T21-24-40Z.
Title MinIO is Vulnerable to SSE Metadata Injection via Replication Headers
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-01T13:42:45.444Z

Reserved: 2026-03-26T15:57:52.323Z

Link: CVE-2026-34204

cve-icon Vulnrichment

Updated: 2026-04-01T13:42:41.213Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-03-31T20:16:28.583

Modified: 2026-04-01T14:23:37.727

Link: CVE-2026-34204

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T20:11:02Z

Weaknesses