Back to CVE risk briefs

External risk intelligence

S3-proxy could allow external attackers to read, write, or delete S3 storage data

The oxyno-zeta/s3-proxy gateway could allow external attackers to read, modify, or delete files, potentially exposing sensitive customer data in protected S3 namespaces. This flaw circumvents security controls, risking the integrity of these critical storage assets.

NVD published May 11, 2026 (19 hours ago)

External risk briefCRITICAL

CVE-2026-42882

Exposure facts

Severity
CRITICAL
Published by NVD
May 11, 2026 (19 hours ago)

H – Horizon Alert

The s3-proxy component contains a security flaw where inconsistent interpretation of web address paths leads to an authentication bypass. This technical mismatch allows unauthorized users to circumvent security controls intended to protect cloud storage resources. Consequently, an attacker could potentially read, modify, or delete sensitive objects within protected namespaces, creating a significant risk to data confidentiality and integrity.

A – Asset Exposure

This vulnerability affects the `oxyno-zeta/s3-proxy` tool, which serves as a gateway for AWS S3 storage. An unauthorized party with network access could bypass security controls, potentially leading to the theft, modification, or deletion of sensitive files and customer data stored within protected S3 namespaces. Depending on the specific deployment environment, this exposure could impact the confidentiality and integrity of these operational systems and storage assets.

L – Live Threat

This issue involves a technical weakness in how the proxy handles web requests, which could potentially allow unauthorized access to or modification of stored objects if an attacker has network access. At this time, the available context does not indicate active exploitation or known targeting of this flaw. Furthermore, we are not aware of any public exploit code or proof-of-concept activity associated with this vulnerability.

O – Operational Fix

To address the identified authentication concerns, we recommend updating the proxy software to the latest vendor-supplied version as part of your upcoming maintenance cycle. The vendor has released a fix that resolves the underlying path interpretation inconsistencies that previously allowed unauthorized access to storage namespaces. Please prioritize this deployment to restore robust access controls across your proxy environment.

References