Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/minio/minio
  4. ›
  5. CVE-2025-31489

CVE-2025-31489: MinIO performs incomplete signature validation for unsigned-trailer uploads

April 4, 2025

This is a high priority vulnerability and users must upgrade ASAP.

The signature component of the authorization may be invalid, which would mean that as a client you can use any arbitrary secret to upload objects given the user already has prior WRITE permissions on the bucket,

Prior knowledge of access-key, and bucket name this user might have access to - and an access-key with a WRITE permissions is necessary.

However with relevant information in place, uploading random objects to buckets is trivial and easy via curl

References

  • github.com/advisories/GHSA-wg47-6jq2-q2hh
  • github.com/minio/minio
  • github.com/minio/minio/commit/8c70975283f9f4ce80f331a25c7475a36279e519
  • github.com/minio/minio/pull/21103
  • github.com/minio/minio/security/advisories/GHSA-wg47-6jq2-q2hh
  • nvd.nist.gov/vuln/detail/CVE-2025-31489

Code Behaviors & Features

Detect and mitigate CVE-2025-31489 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.0.0-20250403145552-8c70975283f9

Fixed versions

  • 0.0.0-20250403145552-8c70975283f9

Solution

Upgrade to version 0.0.0-20250403145552-8c70975283f9 or above.

Weakness

  • CWE-347: Improper Verification of Cryptographic Signature

Source file

go/github.com/minio/minio/CVE-2025-31489.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:04 +0000.