High severityNVD Advisory· Published Feb 25, 2026· Updated Feb 25, 2026
RustFS's Missing Post Policy Validation leads to Arbitrary Object Write
CVE-2026-27607
Description
RustFS is a distributed object storage system built in Rust. In versions 1.0.0-alpha.56 through 1.0.0-alpha.82, RustFS does not validate policy conditions in presigned POST uploads (PostObject), allowing attackers to bypass content-length-range, starts-with, and Content-Type constraints. This enables unauthorized file uploads exceeding size limits, uploads to arbitrary object keys, and content-type spoofing, potentially leading to storage exhaustion, unauthorized data access, and security bypasses. Version 1.0.0-alpha.83 fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
rustfscrates.io | >= 1.0.0-alpha.56, < 1.0.0-alpha.83 | 1.0.0-alpha.83 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-w5fh-f8xh-5x3pghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-27607ghsaADVISORY
- github.com/rustfs/rustfs/releases/tag/1.0.0-alpha.83ghsaWEB
- github.com/rustfs/rustfs/security/advisories/GHSA-w5fh-f8xh-5x3pghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.