Home

Description

An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an attacker holding an unrestricted application credential for project A to create an EC2 credential targeting project B; a subsequent /v3/ec2tokens exchange would then issue a Keystone token scoped to project B while still carrying the original app_cred_id, enabling cross-project lateral movement within the credential owner's role footprint.

PUBLISHED Reserved 2026-05-01 | Published 2026-05-01 | Updated 2026-05-01 | Assigner mitre




HIGH: 7.9CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L

Problem types

CWE-863 Incorrect Authorization

Product status

Default status
unaffected

13 (custom)
affected

References

bugs.launchpad.net/keystone/+bug/2149775

review.opendev.org/c/openstack/keystone/+/985804

cve.org (CVE-2026-43001)

nvd.nist.gov (CVE-2026-43001)

Download JSON