CVE-2026-27822

9.0 CRITICAL

📋 TL;DR

A stored cross-site scripting (XSS) vulnerability in RustFS Console allows attackers to inject malicious JavaScript that executes when administrators view the management console. This enables credential theft from localStorage, potentially leading to full account takeover and system compromise. All RustFS deployments using versions before 1.0.0-alpha.83 are affected.

💻 Affected Systems

Products:
  • RustFS
Versions: All versions prior to 1.0.0-alpha.83
Operating Systems: Any OS running RustFS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects deployments with RustFS Console enabled and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through administrator account takeover, allowing data theft, system manipulation, and lateral movement within the infrastructure.

🟠

Likely Case

Administrator credential theft leading to unauthorized access to the RustFS management console and potential data exfiltration.

🟢

If Mitigated

Limited impact if proper network segmentation, console access controls, and monitoring are in place to detect suspicious activity.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to upload malicious content to RustFS and trick administrators into viewing it in the console.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.0.0-alpha.83

Vendor Advisory: https://github.com/rustfs/rustfs/security/advisories/GHSA-v9fg-3cr2-277j

Restart Required: Yes

Instructions:

1. Stop RustFS service. 2. Update to version 1.0.0-alpha.83 or later. 3. Restart RustFS service. 4. Verify the fix by checking version and testing PDF preview functionality.

🔧 Temporary Workarounds

Disable RustFS Console

all

Temporarily disable the management console interface to prevent exploitation.

Edit RustFS configuration to set 'console_enabled = false'

Restrict Console Access

all

Limit access to RustFS Console to trusted IP addresses only.

Configure firewall rules to restrict access to RustFS Console port

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to prevent JavaScript execution
  • Monitor and audit all file uploads to RustFS for suspicious content

🔍 How to Verify

Check if Vulnerable:

Check RustFS version: if version is earlier than 1.0.0-alpha.83, system is vulnerable.

Check Version:

rustfs --version

Verify Fix Applied:

Confirm version is 1.0.0-alpha.83 or later and test PDF preview functionality in console.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to RustFS
  • Multiple failed login attempts to console
  • Suspicious JavaScript in uploaded files

Network Indicators:

  • Unexpected outbound connections from RustFS server
  • Traffic patterns suggesting credential exfiltration

SIEM Query:

source="rustfs" AND (event="file_upload" AND file_extension="pdf") OR (event="console_login" AND result="success" AND user="admin")

🔗 References

📤 Share & Export