CVE-2026-21862
high-risk
Published 2026-02-03
RustFS is a distributed object storage system built in Rust. Prior to version alpha.78, IP-based access control can be bypassed: get_condition_values trusts client-supplied X-Forwarded-For/X-Real-Ip without verifying a trusted proxy, so any reachable client can spoof aws:SourceIp and satisfy IP-allowlist policies. This issue has been patched in version alpha.78.
Do I need to act?
-
0.04% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Rustfs
Affected Vendors
References (1)
54
/ 100
high-risk
Severity
26/34 · High
Exploitability
0/34 · Minimal
Exposure
28/34 · Critical