Insertion of Sensitive Information into Log File Affecting rustfs package, versions <1.0.0-alpha.80


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Insertion of Sensitive Information into Log File vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-RUSTFS-15033094
  • published18 Jan 2026
  • disclosed16 Jan 2026
  • creditrand-tech

Introduced: 16 Jan 2026

NewCVE-2026-22782  (opens in a new tab)
CWE-532  (opens in a new tab)

How to fix?

Upgrade rustfs to version 1.0.0-alpha.80 or higher.

Overview

rustfs is a high-performance distributed object storage software built using Rust, one of the most popular languages worldwide. Along with MinIO, it shares a range of advantages such as simplicity, S3 compatibility, open-source nature, support for data lakes, AI, and big data. Furthermore, it has a better and more user-friendly open-source license in comparison to other storage systems, being constructed under the Apache license.

Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File in the verify_rpc_signature function. An attacker can obtain sensitive authentication secrets by submitting requests with invalid signatures, causing the server to log the shared HMAC secret and expected signature, which can then be accessed by anyone with access to the logs. This information can be used to forge valid RPC signatures and perform unauthorized actions.

CVSS Base Scores

version 4.0
version 3.1