Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2025-31489Improper Verification of Cryptographic Signature in Minio

Severity
8.7HIGHNVD
EPSS
4.9%
top 10.45%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 3
Latest updateApr 10

Description

MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. The signature component of the authorization may be invalid, which would mean that as a client you can use any arbitrary secret to upload objects given the user already has prior WRITE permissions on the bucket. Prior knowledge of access-key, and bucket name this user might have access to - and an access-key with a WRITE permissions is necessary. However with relevant information in place, uploading

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Packages2 packages

CVEListV5minio/minio< RELEASE.2025-04-03T14-56-28Z
Gogithub.com/minio_minio< 0.0.0-20250403145552-8c70975283f9

🔴Vulnerability Details

3
OSV
MinIO performs incomplete signature validation for unsigned-trailer uploads in github.com/minio/minio2025-04-09
OSV
MinIO performs incomplete signature validation for unsigned-trailer uploads2025-04-04
GHSA
MinIO performs incomplete signature validation for unsigned-trailer uploads2025-04-04

💥Exploits & PoCs

1
Nuclei
MinIO - Incomplete Signature Validation for Unsigned-Trailer Uploads

🔍Detection Rules

1
Suricata
ET WEB_SERVER MinIO Incomplete Signature Validation for Unsigned-Trailer Uploads (CVE-2025-31489)2025-04-10

📋Vendor Advisories

1
Red Hat
minio: MinIO performs incomplete signature validation for unsigned-trailer uploads2025-04-03