Impact
MinIO's Snowball auto‑extract handler, PutObjectExtractHandler, contains an authentication bypass that allows any user who has a valid access key to upload arbitrary objects to any bucket. The bug stems from a missing signature check when the auth type is streaming unsigned trailer. An attacker can craft a PUT request with a forged signature, include X‑Amz‑Content‑Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER and the Snowball‑Auto‑Extract metadata flag, and the request is accepted and the payload is extracted into the target bucket. This flaw permits unauthorized data insertion and potential overwriting of existing objects, compromising the integrity of stored data and is classified as CWE‑287 and CWE‑306.
Affected Systems
The vulnerability affects all MinIO deployments running the open‑source minio/minio product between RELEASE.2023-05-18T00-05-36Z and just before RELEASE.2026-04-11T03-20-12Z. Earlier releases before 2023-05-18 are not affected. Any installation that has not applied the April 2026 update is vulnerable, including those using the default minioadmin credentials or any user with WRITE permissions on a bucket.
Risk and Exploitability
The CVSS score is 8.8, indicating a high‑severity defect that can lead to unrestricted write access. The EPSS score is not available, and the flaw is not listed in CISA KEV, but the risk remains high because the attack requires only a valid access key and a bucket name, which are often known or default credentials exist. An attacker can trigger the flaw remotely by sending a crafted PUT request to the S3 endpoint; no privileged local access is needed. This makes the vulnerability a high‑risk remote attack vector.
OpenCVE Enrichment