Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-39360

CVE-2026-39360: RustFS Auth Bypass Vulnerability

CVE-2026-39360 is an authorization bypass flaw in RustFS that allows low-privileged users to exfiltrate objects from victim buckets, breaking tenant isolation. This article covers technical details, affected versions, and mitigation.

Published: April 10, 2026

CVE-2026-39360 Overview

CVE-2026-39360 is a missing authorization vulnerability in RustFS, a distributed object storage system built in Rust. Prior to version alpha.90, RustFS contains a missing authorization check in the multipart copy path (UploadPartCopy). This flaw allows a low-privileged user who cannot read objects from a victim bucket to still exfiltrate victim objects by copying them into an attacker-controlled multipart upload and completing the upload. This vulnerability breaks tenant isolation in multi-user and multi-tenant deployments.

Critical Impact

Low-privileged attackers can bypass access controls to exfiltrate data from buckets they should not have access to, breaking tenant isolation in shared environments.

Affected Products

  • RustFS versions prior to alpha.90

Discovery Timeline

  • 2026-04-07 - CVE-2026-39360 published to NVD
  • 2026-04-08 - Last updated in NVD database

Technical Details for CVE-2026-39360

Vulnerability Analysis

This vulnerability stems from CWE-862 (Missing Authorization), a critical access control flaw where the application fails to perform necessary authorization checks before granting access to a protected resource. In the context of RustFS, the multipart copy functionality (UploadPartCopy) does not properly verify that the requesting user has read permissions on the source object before allowing the copy operation to proceed.

The attack exploits a gap between the authorization model for direct object access and the authorization model for multipart upload operations. While RustFS correctly enforces read permissions when users attempt to directly access objects via standard GET operations, the UploadPartCopy endpoint bypasses these checks. This creates an authorization bypass that allows data exfiltration without triggering normal access controls.

Root Cause

The root cause is a missing authorization check in the UploadPartCopy code path. When a user initiates a multipart upload and uses the copy functionality to add parts from other buckets, the system fails to validate whether the requesting user has the necessary read permissions on the source bucket and object. The authorization logic only verifies write permissions to the destination bucket (which the attacker controls) but neglects to check read permissions on the source object being copied.

Attack Vector

An attacker exploits this vulnerability through a network-based attack requiring low privileges (authenticated access to the RustFS system). The attack flow proceeds as follows:

  1. The attacker authenticates to RustFS with low-privilege credentials that grant write access to at least one bucket
  2. The attacker initiates a multipart upload to their own controlled bucket
  3. Using the UploadPartCopy operation, the attacker specifies a source object from a victim's bucket
  4. RustFS copies the data without checking if the attacker has read permissions on the source
  5. The attacker completes the multipart upload, gaining full access to the exfiltrated data

This attack is particularly dangerous in multi-tenant environments where bucket isolation is critical for security. The vulnerability requires no user interaction and can be executed with low attack complexity. For detailed technical information, see the GitHub Security Advisory.

Detection Methods for CVE-2026-39360

Indicators of Compromise

  • Multipart uploads with UploadPartCopy operations where the source bucket differs from the destination bucket
  • Cross-bucket copy operations initiated by users without read permissions on the source bucket
  • Unusual patterns of multipart uploads targeting objects owned by other tenants
  • Audit log entries showing UploadPartCopy requests that bypass normal access control logs

Detection Strategies

  • Implement monitoring for UploadPartCopy API calls that reference cross-tenant or cross-bucket sources
  • Deploy behavioral analytics to detect users accessing objects they have never legitimately accessed before
  • Enable verbose logging for all multipart upload operations including source object references
  • Create alerts for multipart uploads that complete with parts copied from multiple different source buckets

Monitoring Recommendations

  • Review RustFS access logs for anomalous UploadPartCopy operations
  • Monitor for spikes in multipart upload activity, particularly involving cross-bucket references
  • Implement real-time alerting for any authorization failures followed by successful copy operations
  • Audit tenant boundaries regularly to identify potential data exfiltration patterns

How to Mitigate CVE-2026-39360

Immediate Actions Required

  • Upgrade RustFS to version alpha.90 or later immediately
  • Audit multipart upload logs for any suspicious cross-bucket copy operations
  • Review tenant data for signs of unauthorized access or exfiltration
  • Temporarily disable the UploadPartCopy functionality if upgrade is not immediately possible

Patch Information

The vulnerability has been fixed in RustFS version alpha.90. Organizations running affected versions should upgrade immediately. The fix ensures that proper authorization checks are performed on the source object during UploadPartCopy operations, verifying that the requesting user has read permissions before allowing the copy to proceed. For more information, refer to the GitHub Security Advisory.

Workarounds

  • Restrict access to the UploadPartCopy API endpoint at the network or reverse proxy level
  • Implement additional authorization middleware to validate source object permissions before forwarding requests
  • Isolate tenant workloads to separate RustFS instances if possible until patching is complete
  • Enable enhanced logging and monitoring to detect exploitation attempts
bash
# Example: Restrict UploadPartCopy at reverse proxy level (nginx)
# Add to location block handling RustFS API requests
location /api/v1/ {
    # Block UploadPartCopy requests until patch is applied
    if ($request_uri ~* "uploadPartCopy") {
        return 403;
    }
    proxy_pass http://rustfs_backend;
}

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechRustfs

  • SeverityMEDIUM

  • CVSS Score5.3

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-862
  • Technical References
  • GitHub Security Advisory
  • Related CVEs
  • CVE-2026-40937: RustFS Auth Bypass Vulnerability

  • CVE-2026-27607: Rustfs Auth Bypass Vulnerability

  • CVE-2026-21862: RustFS Auth Bypass Vulnerability

  • CVE-2025-68926: Rustfs Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English