CVE-2026-34204Improper Authentication in Minio

Severity
7.1HIGHNVD
EPSS
0.0%
top 93.12%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 31
Latest updateApr 2

Description

MinIO is a high-performance object storage system. Prior to version RELEASE.2026-03-26T21-24-40Z, a flaw in extractMetadataFromMime() allows any authenticated user with s3:PutObject permission to inject internal server-side encryption metadata into objects by sending crafted X-Minio-Replication-* headers on a normal PutObject request. This issue has been patched in version RELEASE.2026-03-26T21-24-40Z.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N

Affected Packages3 packages

CVEListV5minio/minio< RELEASE.2026-03-26T21-24-40Z
NVDminio/minio< 2026-03-26t21-24-40z
Gogithub.com/minio_minio0.0.0-20240328174456-468a9fae83e90.0.0-20260212201848-7aac2a2c5b7c+1

🔴Vulnerability Details

3
OSV
MinIO is Vulnerable to SSE Metadata Injection via Replication Headers in github.com/minio/minio2026-04-02
GHSA
MinIO is Vulnerable to SSE Metadata Injection via Replication Headers2026-03-27
OSV
MinIO is Vulnerable to SSE Metadata Injection via Replication Headers2026-03-27

🕵️Threat Intelligence

1
Wiz
CVE-2026-34204 Impact, Exploitability, and Mitigation Steps | Wiz