Advisory Database
  • Advisories
  • Dependency Scanning
  1. pypi
  2. ›
  3. keystone
  4. ›
  5. CVE-2026-33551

CVE-2026-33551: OpenStack Keystone: Restricted application credentials can create EC2 credentials

April 10, 2026

An issue was discovered in OpenStack Keystone 14 through 26 before 26.1.1, 27.0.0, 28.0.0, and 29.0.0. Restricted application credentials can create EC2 credentials. By using a restricted application credential to call the EC2 credential creation API, an authenticated user with only a reader role may obtain an EC2/S3 credential that carries the full set of the parent user’s S3 permissions, effectively bypassing the role restrictions imposed on the application credential. Only deployments that use restricted application credentials in combination with the EC2/S3 compatibility API (swift3 / s3api) are affected.

References

  • bugs.launchpad.net/keystone/+bug/2142138
  • github.com/advisories/GHSA-4phw-6824-6cfp
  • github.com/openstack/keystone
  • nvd.nist.gov/vuln/detail/CVE-2026-33551
  • security.openstack.org/ossa/OSSA-2026-005.html

Code Behaviors & Features

Detect and mitigate CVE-2026-33551 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 14.0.0 before 26.1.1

Fixed versions

  • 26.1.1

Solution

Upgrade to version 26.1.1 or above.

Impact 3.5 LOW

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

pypi/keystone/CVE-2026-33551.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:34 +0000.