Moderate severityOSV Advisory· Published Jan 8, 2026· Updated Jan 8, 2026
RustFS has IAM deny_only Short-Circuit that Allows Privilege Escalation via Service Account Minting
CVE-2026-22043
Description
RustFS is a distributed object storage system built in Rust. In versions 1.0.0-alpha.13 through 1.0.0-alpha.78, a flawed deny_only short-circuit in RustFS IAM allows a restricted service account or STS credential to self-issue an unrestricted service account, inheriting the parent’s full privileges. This enables privilege escalation and bypass of session/inline policy restrictions. Version 1.0.0-alpha.79 fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
rustfscrates.io | >= 1.0.0-alpha.13, < 1.0.0-alpha.79 | 1.0.0-alpha.79 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-xgr5-qc6w-vcg9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-22043ghsaADVISORY
- github.com/rustfs/rustfs/security/advisories/GHSA-xgr5-qc6w-vcg9ghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.