{"api_version":"1","generated_at":"2026-04-22T23:09:19+00:00","cve":"CVE-2023-25812","urls":{"html":"https://cve.report/CVE-2023-25812","api":"https://cve.report/api/cve/CVE-2023-25812.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-25812","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-25812"},"summary":{"title":"CVE-2023-25812","description":"Minio is a Multi-Cloud Object Storage framework. Affected versions do not correctly honor a `Deny` policy on ByPassGoverance. Ideally, minio should return \"Access Denied\" to all users attempting to DELETE a versionId with the special header `X-Amz-Bypass-Governance-Retention: true`. However, this was not honored instead the request will be honored and an object under governance would be incorrectly deleted. All users are advised to upgrade. There are no known workarounds for this issue.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-02-21 21:15:00","updated_at":"2023-11-07 04:09:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://github.com/minio/minio/security/advisories/GHSA-c8fc-mjj8-fc63","name":"https://github.com/minio/minio/security/advisories/GHSA-c8fc-mjj8-fc63","refsource":"MISC","tags":[],"title":"Privilege escalation allowing DELETE on resources on object locked buckets under Governance mode · Advisory · minio/minio · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/minio/minio/commit/a7188bc9d0f0a5ae05aaf1b8126bcd3cb3fdc485","name":"https://github.com/minio/minio/commit/a7188bc9d0f0a5ae05aaf1b8126bcd3cb3fdc485","refsource":"MISC","tags":[],"title":"fix: evaluate BypassGov policy action in deletion correctly (#16635) · minio/minio@a7188bc · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/minio/minio/pull/16635","name":"https://github.com/minio/minio/pull/16635","refsource":"MISC","tags":[],"title":"fix: evaluate BypassGov policy action in deletion correctly by vadmeste · Pull Request #16635 · minio/minio · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-25812","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25812","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"25812","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"minio","cpe5":"minio","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-25812","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Minio is a Multi-Cloud Object Storage framework. Affected versions do not correctly honor a `Deny` policy on ByPassGoverance. Ideally, minio should return \"Access Denied\" to all users attempting to DELETE a versionId with the special header `X-Amz-Bypass-Governance-Retention: true`. However, this was not honored instead the request will be honored and an object under governance would be incorrectly deleted. All users are advised to upgrade. There are no known workarounds for this issue."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-281: Improper Preservation of Permissions","cweId":"CWE-281"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"minio","product":{"product_data":[{"product_name":"minio","version":{"version_data":[{"version_affected":"=","version_value":">= RELEASE.2020-04-10T03-34-42Z, < RELEASE.2023-02-17T17-52-43Z"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/minio/minio/security/advisories/GHSA-c8fc-mjj8-fc63","refsource":"MISC","name":"https://github.com/minio/minio/security/advisories/GHSA-c8fc-mjj8-fc63"},{"url":"https://github.com/minio/minio/pull/16635","refsource":"MISC","name":"https://github.com/minio/minio/pull/16635"},{"url":"https://github.com/minio/minio/commit/a7188bc9d0f0a5ae05aaf1b8126bcd3cb3fdc485","refsource":"MISC","name":"https://github.com/minio/minio/commit/a7188bc9d0f0a5ae05aaf1b8126bcd3cb3fdc485"}]},"source":{"advisory":"GHSA-c8fc-mjj8-fc63","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L","version":"3.1"}]}},"nvd":{"publishedDate":"2023-02-21 21:15:00","lastModifiedDate":"2023-11-07 04:09:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*","versionStartIncluding":"2020-04-10t03-34-42z","versionEndExcluding":"2023-02-17t17-52-43z","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}