Skip to content

x/vulndb: potential Go vuln in github.com/minio/minio: GHSA-3rh2-v3gr-35p9 #4896

@GoVulnBot

Description

@GoVulnBot

Advisory GHSA-3rh2-v3gr-35p9 references a vulnerability in the following Go modules:

Module
github.com/minio/minio

Description:

Impact

What kind of vulnerability is it? Who is impacted?

A flaw in extractMetadataFromMime() allows any authenticated user with s3:PutObject permission to inject internal server-side encryption metadata into objects by sending crafted X-Minio-Replication-* headers on a normal PutObject request. The server unconditionally maps these headers to X-Minio-Internal-* encryption metadata without verifying that the request is a legitimate replication request. Objects written this way carry bogus encryption keys and become permanently unreadable through the S3 API.

Any authenticate...

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/minio/minio
      non_go_versions:
        - introduced: TODO (earliest fixed "", vuln range ">= 0.0.0-20240328174456-468a9fae83e9, <= 0.0.0-20260212201848-7aac2a2c5b7c")
      vulnerable_at: 0.0.0-20260212201848-7aac2a2c5b7c
summary: MinIO is Vulnerable to SSE Metadata Injection via Replication Headers in github.com/minio/minio
cves:
    - CVE-2026-34204
ghsas:
    - GHSA-3rh2-v3gr-35p9
references:
    - advisory: https://github.com/advisories/GHSA-3rh2-v3gr-35p9
    - advisory: https://github.com/minio/minio/security/advisories/GHSA-3rh2-v3gr-35p9
    - web: https://docs.min.io/enterprise/aistor-object-store/upgrade-aistor-server/community-edition
source:
    id: GHSA-3rh2-v3gr-35p9
    created: 2026-03-27T23:01:13.88418032Z
review_status: UNREVIEWED

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions