CVE-2026-43001

high

Description

An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an attacker holding an unrestricted application credential for project A to create an EC2 credential targeting project B; a subsequent /v3/ec2tokens exchange would then issue a Keystone token scoped to project B while still carrying the original app_cred_id, enabling cross-project lateral movement within the credential owner's role footprint.

References

https://review.opendev.org/c/openstack/keystone/+/985804

https://bugs.launchpad.net/keystone/+bug/2149775

Details

Source: Mitre, NVD

Published: 2026-05-01

Updated: 2026-05-01

Risk Information

CVSS v2

Base Score: 6.4

Vector: CVSS2#AV:N/AC:H/Au:M/C:C/I:C/A:P

Severity: Medium

CVSS v3

Base Score: 7.9

Vector: CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:L

Severity: High