PT-2026-31855 · Openstack · Openstack Keystone
Published
2026-04-10
·
Updated
2026-04-10
·
CVE-2026-33551
CVSS v3.1
3.5
Low
| AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N |
Name of the Vulnerable Software and Affected Versions
OpenStack Keystone versions 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0
Description
A flaw exists in OpenStack Keystone where restricted application credentials can be used to create EC2 credentials. An authenticated user with a reader role can potentially obtain EC2/S3 credentials with the full permissions of the parent user, bypassing intended role restrictions. This occurs when using restricted application credentials with the EC2/S3 compatibility API (swift3 / s3api).
Recommendations
Update to OpenStack Keystone version 26.1.1 or later.
Update to OpenStack Keystone version 27.0.1 or later.
Update to OpenStack Keystone version 28.0.1 or later.
Update to OpenStack Keystone version 29.0.1 or later.
Exploit
Fix
LPE
Incorrect Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Openstack Keystone