Skip to content

MinIO Java Client XML Tag Value Substitution Vulnerability

High
harshavardhana published GHSA-h7rh-xfpj-hpcm Sep 29, 2025

Package

maven io.minio.minio (Maven)

Affected versions

< 8.6.0

Patched versions

8.6.0

Description

Description

In minio-java versions prior to 8.6.0, XML tag values containing references to system properties or environment variables were automatically substituted with their actual values during processing. This unintended behavior could lead to the exposure of sensitive information, including credentials, file paths, or system configuration details, if such references were present in XML content from untrusted sources.

Affected Versions

  • minio-java < 8.6.0

All applications utilizing affected versions of minio-java for parsing XML with potentially untrusted input are vulnerable.

Impact

This vulnerability poses a high risk of information disclosure. Attackers could craft malicious XML inputs to extract sensitive data from the system's properties or environment variables, potentially compromising security in applications relying on minio-java for object storage operations.

Patches

The issue is resolved in minio-java version 8.6.0 and later. In these versions, automatic substitution of XML tag values with system properties or environment variables has been disabled.

Users are strongly advised to upgrade to minio-java 8.6.0 or a newer release to mitigate the vulnerability.

Workarounds

No full workarounds exist without upgrading the library. As interim measures:

  • Refrain from processing XML data from untrusted or external sources.
  • Implement input sanitization or validation to detect and remove references to
    system properties or environment variables in XML content.

References

Severity

High

CVE ID

CVE-2025-59952

Weaknesses

No CWEs

Credits