The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-59952

CVE-2025-59952: MinIO Java SDK Information Disclosure Flaw

CVE-2025-59952 is an information disclosure vulnerability in MinIO Java SDK that exposes sensitive system properties and environment variables through XML processing. This article covers technical details, affected versions, and mitigation.

Published: May 11, 2026

CVE-2025-59952 Overview

CVE-2025-59952 affects the MinIO Java SDK (minio-java), a Simple Storage Service (S3) client used to perform bucket and object operations against S3-compatible object storage. In versions prior to 8.6.0, the XML parser automatically substituted system property and environment variable references found inside XML tag values with their actual runtime values. An attacker controlling XML content processed by the SDK can extract sensitive host data including credentials, file paths, and configuration details. The maintainers fixed the issue in version 8.6.0 by registering a no-op filter on the XML serializer. This vulnerability is classified under CWE-20: Improper Input Validation.

Critical Impact

Untrusted XML processed by minio-java can trigger automatic substitution of ${...} references, leaking environment variables, system properties, and credentials into responses or logs.

Affected Products

  • MinIO Java SDK (minio-java) versions prior to 8.6.0
  • Java applications using io.minio:minio as an S3 client library
  • Downstream services that parse XML responses from S3-compatible endpoints via the affected SDK

Discovery Timeline

  • 2025-09-30 - CVE-2025-59952 published to NVD
  • 2026-04-15 - Last updated in NVD database

Technical Details for CVE-2025-59952

Vulnerability Analysis

The MinIO Java SDK uses the SimpleXML framework (org.simpleframework.xml) to marshal and unmarshal S3 protocol messages. SimpleXML supports template substitution syntax such as ${variable} inside XML element values. By default, the Persister resolves these references against system properties and environment variables at parse time. The SDK did not disable this behavior, so any ${PATH}, ${user.home}, ${AWS_SECRET_ACCESS_KEY}, or similar token embedded in XML content was silently replaced with the JVM's actual value. When the SDK then echoed parsed content into responses, exception messages, or logs, the resolved value leaked to the attacker or to log aggregation systems.

Root Cause

The root cause is improper input validation [CWE-20] in api/src/main/java/io/minio/Xml.java. The Persister was instantiated without a Filter, so SimpleXML applied its default SystemFilter that resolves environment variables and system properties. Untrusted XML therefore controlled which host values were dereferenced.

Attack Vector

An attacker who can return or inject XML content consumed by a minio-java client triggers substitution. This includes malicious or compromised S3-compatible endpoints, on-path attackers intercepting unencrypted traffic, and bucket policies, tags, or object metadata containing attacker-supplied ${...} tokens. The exposed values can include API keys, JDBC URLs, file paths, and other secrets present in the JVM environment.

java
 import org.simpleframework.xml.Serializer;
 import org.simpleframework.xml.convert.AnnotationStrategy;
 import org.simpleframework.xml.core.Persister;
+import org.simpleframework.xml.filter.Filter;
 import org.simpleframework.xml.stream.Format;

 /** XML marshaller and unmarshaller. */
 public class Xml {
+  private static final Filter noopFilter =
+      new Filter() {
+        @Override
+        public String replace(String name) {
+          return null;
+        }
+      };
+
   public static String marshal(Object source) throws XmlParserException {
     try {
-      Serializer serializer = new Persister(new AnnotationStrategy(), new Format(0));
+      Serializer serializer = new Persister(new AnnotationStrategy(), noopFilter, new Format(0));
       StringWriter writer = new StringWriter();
       serializer.write(source, writer);
       return writer.toString();

Source: MinIO Java commit f7a98d0. The patch registers a noopFilter whose replace method always returns null, disabling property and environment variable resolution.

Detection Methods for CVE-2025-59952

Indicators of Compromise

  • Outbound HTTP requests or log entries from Java applications containing resolved environment variable values such as AWS_SECRET_ACCESS_KEY or JAVA_HOME content where ${...} tokens were expected.
  • S3 XML responses or object metadata containing ${...} substitution tokens originating from untrusted buckets or endpoints.
  • Application stack traces referencing org.simpleframework.xml.core.Persister paired with values that match local host secrets.

Detection Strategies

  • Inventory all Java artifacts and identify dependencies on io.minio:minio with version less than 8.6.0 using SCA tooling or mvn dependency:tree.
  • Inspect application logs for parsed S3 response bodies that contain values resembling credentials, file paths, or hostnames not present in source XML.
  • Capture and review XML payloads exchanged with non-trusted S3-compatible endpoints to detect crafted ${...} reference patterns.

Monitoring Recommendations

  • Alert on egress traffic from application servers to unexpected S3 endpoints, which may indicate a malicious endpoint coercing XML processing.
  • Monitor application logs and APM traces for substituted secret material appearing in stack traces or response bodies.
  • Track dependency drift through SBOM generation to flag environments still running vulnerable minio-java versions.

How to Mitigate CVE-2025-59952

Immediate Actions Required

  • Upgrade minio-java to version 8.6.0 or later in all Java applications and rebuild affected services.
  • Rotate any credentials, tokens, or secrets that may have been resolved via JVM environment variables or system properties on hosts running the vulnerable SDK.
  • Restrict minio-java clients to trusted S3 endpoints and validate TLS certificates to prevent injection of malicious XML responses.

Patch Information

The fix is delivered in minio-java 8.6.0. See the GitHub Security Advisory GHSA-h7rh-xfpj-hpcm, the 8.6.0 Release Notes, and the upstream commit. The patch installs a Filter whose replace(String name) returns null, instructing SimpleXML to skip property and environment variable substitution.

Workarounds

  • If immediate upgrade is not possible, route minio-java traffic only to trusted, authenticated S3 endpoints and reject responses from third-party storage providers.
  • Strip or reject XML payloads containing ${...} tokens at a proxy layer before they reach the Java application.
  • Reduce sensitive material in JVM environment variables and system properties by sourcing secrets from external vaults at runtime instead.
bash
# Update Maven dependency to the patched version
mvn versions:use-dep-version -Dincludes=io.minio:minio -DdepVersion=8.6.0 -DforceVersion=true

# Or update build.gradle
# implementation 'io.minio:minio:8.6.0'

# Verify resolved version
mvn dependency:tree | grep io.minio

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechMinio

  • SeverityHIGH

  • CVSS Score8.7

  • EPSS Probability0.02%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-20
  • Technical References
  • GitHub Commit Overview

  • GitHub Release Notes

  • GitHub Security Advisory
  • Related CVEs
  • CVE-2023-28432: Minio Information Disclosure Vulnerability

  • CVE-2026-40344: MinIO Auth Bypass Vulnerability

  • CVE-2026-41145: MinIO Auth Bypass Vulnerability

  • CVE-2026-39414: MinIO S3 Select DoS Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English