Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`. 
                
            References
                    | Link | Resource | 
|---|---|
| https://github.com/minio/minio/commit/67f4ba154a27a1b06e48bfabda38355a010dfca5 | Patch | 
| https://github.com/minio/minio/pull/16849 | Exploit Issue Tracking | 
| https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c | Vendor Advisory | 
| https://github.com/minio/minio/commit/67f4ba154a27a1b06e48bfabda38355a010dfca5 | Patch | 
| https://github.com/minio/minio/pull/16849 | Exploit Issue Tracking | 
| https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c | Vendor Advisory | 
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28434 | US Government Resource | 
Configurations
                    History
                    24 Oct 2025, 14:46
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28434 - US Government Resource | 
22 Oct 2025, 00:18
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
21 Oct 2025, 20:19
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
    
21 Oct 2025, 19:20
| Type | Values Removed | Values Added | 
|---|---|---|
| References | 
        
        
  | 
21 Nov 2024, 07:55
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://github.com/minio/minio/commit/67f4ba154a27a1b06e48bfabda38355a010dfca5 - Patch | |
| References | () https://github.com/minio/minio/pull/16849 - Exploit, Issue Tracking | |
| References | () https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c - Vendor Advisory | 
07 Nov 2023, 04:10
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`. | 
28 Mar 2023, 16:24
| Type | Values Removed | Values Added | 
|---|---|---|
| References | (MISC) https://github.com/minio/minio/pull/16849 - Exploit, Issue Tracking | |
| References | (MISC) https://github.com/minio/minio/commit/67f4ba154a27a1b06e48bfabda38355a010dfca5 - Patch | |
| References | (MISC) https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c - Vendor Advisory | |
| First Time | 
        
        Minio
         Minio minio  | 
|
| CVSS | 
        v2 :  v3 :  | 
    
        v2 : unknown
         v3 : 8.8  | 
| CWE | NVD-CWE-noinfo | |
| CPE | cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:* | 
22 Mar 2023, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-03-22 21:15
Updated : 2025-10-24 14:46
NVD link : CVE-2023-28434
Mitre link : CVE-2023-28434
CVE.ORG link : CVE-2023-28434
JSON object : View
Products Affected
                minio
- minio
 
CWE
                