Cyber Posture

CVE-2026-27822

CriticalPublic PoC

Published: 25 February 2026

Published
25 February 2026
Modified
25 February 2026
KEV Added
Patch
CVSS Score 9.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
EPSS Score 0.0004 13.6th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27822 is a critical-severity Cross-site Scripting (CWE-79) vulnerability in Rustfs Rustfs. Its CVSS base score is 9.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 13.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires identification, reporting, and correction of the stored XSS flaw, including patching to the fixed version 1.0.0-alpha.83.

prevent

Prevents injection of malicious XSS payloads by low-privilege attackers through validation of inputs to the RustFS Console.

prevent

Blocks execution of stored XSS payloads during rendering, such as in the PDF preview logic, by filtering console outputs.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1212 Exploitation for Credential Access Credential Access
Adversaries may exploit software vulnerabilities in an attempt to collect credentials.
Why these techniques?

Stored XSS directly enables exploitation for credential access (stealing localStorage admin credentials via injected JS) and privilege escalation (account takeover from low-priv to full admin/system control).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

RustFS is a distributed object storage system built in Rust. Prior to version 1.0.0-alpha.83, a Stored Cross-Site Scripting (XSS) vulnerability in the RustFS Console allows an attacker to execute arbitrary JavaScript in the context of the management console. By bypassing…

more

the PDF preview logic, an attacker can steal administrator credentials from `localStorage`, leading to full account takeover and system compromise. Version 1.0.0-alpha.83 fixes the issue.

Deeper analysisAI

CVE-2026-27822 is a Stored Cross-Site Scripting (XSS) vulnerability, classified under CWE-79, affecting the RustFS Console in RustFS, a distributed object storage system built in Rust. The flaw exists in versions prior to 1.0.0-alpha.83, where improper handling allows stored malicious payloads. It has a CVSS v3.1 base score of 9.0 (AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H), indicating critical severity due to high confidentiality, integrity, and availability impacts with changed scope.

An attacker with low privileges (PR:L) can exploit this over the network (AV:N) with low complexity (AC:L) by injecting a payload that bypasses the PDF preview logic in the console. This requires user interaction (UI:R), such as an administrator viewing the malicious content, enabling arbitrary JavaScript execution in the management console's context. The attacker can then steal administrator credentials stored in localStorage, resulting in full account takeover and potential complete system compromise.

The GitHub Security Advisory at https://github.com/rustfs/rustfs/security/advisories/GHSA-v9fg-3cr2-277j details the issue, confirming that upgrading to version 1.0.0-alpha.83 resolves the vulnerability by addressing the PDF preview bypass and XSS handling. Security practitioners should prioritize patching affected RustFS deployments and review console access controls to mitigate risks from privileged users.

Details

CWE(s)

Affected Products

rustfs
rustfs
1.0.0

CVEs Like This One

CVE-2026-22043Same product: Rustfs Rustfs
CVE-2026-40937Same product: Rustfs Rustfs
CVE-2026-22042Same product: Rustfs Rustfs
CVE-2025-68705Same product: Rustfs Rustfs
CVE-2026-27607Same product: Rustfs Rustfs
CVE-2026-24762Same product: Rustfs Rustfs
CVE-2026-22782Same product: Rustfs Rustfs
CVE-2026-21862Same product: Rustfs Rustfs
CVE-2025-68926Same product: Rustfs Rustfs
CVE-2025-0447Shared CWE-79

References