Privilege Escalation Vulnerability in MinIO Object Storage System
CVE-2025-62506

8.1HIGH

Key Information:

Vendor

Minio

Status
Vendor
CVE Published:
16 October 2025

Badges

πŸ“ˆ Score: 324πŸ‘Ύ Exploit Exists🟑 Public PoC

What is CVE-2025-62506?

CVE-2025-62506 is a prominent privilege escalation vulnerability found in the MinIO object storage system. MinIO is designed to provide high-performance, scalable object storage for cloud-native environments, making it a key infrastructure component for many organizations. This vulnerability affects all versions prior to RELEASE.2025-10-15T17-29-55Z and allows attackers with restricted service accounts or Security Token Service (STS) accounts to bypass their inline policy limitations. The core issue lies in the flawed validation logic within the Identity and Access Management (IAM) policy framework, where the system improperly relies on a DenyOnly argument during session policy validation. As a result, an attacker with valid credentials can effectively create a new service account with full privileges, circumventing intended restrictions. This capability can lead to unauthorized access to sensitive data, giving attackers the means to modify, delete, or create objects beyond their assigned permissions.

Potential impact of CVE-2025-62506

  1. Unauthorized Data Access: The vulnerability enables attackers to gain unauthorized access to storage buckets and objects, potentially leading to data breaches that can compromise sensitive information, including personally identifiable information (PII) and confidential business data.

  2. Modification and Deletion of Data: With escalated privileges, attackers can alter or remove critical data within the MinIO system, which could disrupt business operations, damage data integrity, and lead to significant operational losses for affected organizations.

  3. Increased Attack Surface: By allowing attackers to create unregulated service accounts, the vulnerability broadens the attack surface, making it easier for malicious actors to exploit further weaknesses or launch subsequent attacks within the network, increasing the overall security risk for organizations using MinIO.

Affected Version(s)

minio < RELEASE.2025-10-15T17-29-55Z

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.