Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-43001: CWE-863 Incorrect Authorization in OpenStack Keystone

0
High
VulnerabilityCVE-2026-43001cvecve-2026-43001cwe-863
Published: Fri May 01 2026 (05/01/2026, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: OpenStack
Product: Keystone

Description

CVE-2026-43001 is a high-severity authorization vulnerability in OpenStack Keystone versions 13 through 29. It allows an attacker with an unrestricted application credential for one project to create EC2 credentials for a different project. This leads to issuance of Keystone tokens scoped to the unintended project, enabling cross-project lateral movement within the attacker's role permissions. The vulnerability affects the POST /v3/credentials endpoint, which fails to validate that the caller-supplied project_id matches the authenticating credential's project. A patch is available, and since Keystone is a cloud service, the vendor typically manages remediation server-side.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/01/2026, 08:51:28 UTC

Technical Analysis

OpenStack Keystone versions 13 through 29 contain an authorization flaw (CWE-863) in the POST /v3/credentials API endpoint. The service does not verify that the project_id provided when creating an EC2-type credential matches the project associated with the authenticating application credential. This allows an attacker holding an unrestricted application credential for project A to create EC2 credentials for project B. Subsequently, exchanging these credentials via /v3/ec2tokens issues a Keystone token scoped to project B but still linked to the original application credential ID. This enables cross-project lateral movement within the attacker's role scope. The CVSS 3.1 score is 7.9 (high severity), reflecting network attack vector, high privileges required, no user interaction, scope change, and high confidentiality and integrity impact with low availability impact. A patch is available, and as Keystone is a cloud service, remediation is typically managed by the vendor.

Potential Impact

Successful exploitation allows an attacker with an unrestricted application credential in one project to create EC2 credentials for another project and obtain tokens scoped to that other project. This results in unauthorized cross-project access and lateral movement within the attacker's role permissions, potentially exposing sensitive data or operations across projects. The impact includes high confidentiality and integrity compromise with limited availability impact.

Mitigation Recommendations

A patch is available for this vulnerability. Since OpenStack Keystone is a cloud service, the vendor typically manages remediation server-side. Users should verify with the vendor advisory that their Keystone deployment has been updated to address this issue. Until patched, restricting application credential privileges and monitoring for unusual credential creation activity may help reduce risk. Patch status is confirmed as available, so applying the official fix is the recommended mitigation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-05-01T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null
Is Cloud Service
true

Threat ID: 69f46607cbff5d861092e800

Added to database: 5/1/2026, 8:36:23 AM

Last enriched: 5/1/2026, 8:51:28 AM

Last updated: 5/1/2026, 10:59:15 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses