Skip to content

x/vulndb: potential Go vuln in github.com/treeverse/lakefs: GHSA-f2ph-gc9m-q55f #4321

@GoVulnBot

Description

@GoVulnBot

Advisory GHSA-f2ph-gc9m-q55f references a vulnerability in the following Go modules:

Module
github.com/treeverse/lakefs

Description:

Impact

LakeFS's S3 gateway does not validate timestamps in authenticated requests, allowing replay attacks. An attacker who captures a valid signed request (e.g., through network interception, logs, or compromised systems) can replay that request until credentials are rotated, even after the request is intended to expire.

Patches

This issue affects all versions of lakeFS up to and including v1.74.4.

The vulnerability has been fixed in version v1.75.0.

Users should upgrade to version v1.75.0.

Workarounds

Until upgraded, implement these mitigations:

  • **Use short-lived credenti...

References:

Cross references:

See doc/quickstart.md for instructions on how to triage this report.

id: GO-ID-PENDING
modules:
    - module: github.com/treeverse/lakefs
      versions:
        - fixed: 1.75.0
      vulnerable_at: 1.74.4
summary: lakeFS is Missing Timestamp Validation in S3 Gateway Authentication in github.com/treeverse/lakefs
cves:
    - CVE-2025-68671
ghsas:
    - GHSA-f2ph-gc9m-q55f
references:
    - advisory: https://github.com/advisories/GHSA-f2ph-gc9m-q55f
    - advisory: https://github.com/treeverse/lakeFS/security/advisories/GHSA-f2ph-gc9m-q55f
    - fix: https://github.com/treeverse/lakeFS/commit/92966ae611d7f1a2bbe7fd56f9568c975aab2bd8
    - fix: https://github.com/treeverse/lakeFS/pull/9710
    - report: https://github.com/treeverse/lakeFS/issues/9599
source:
    id: GHSA-f2ph-gc9m-q55f
    created: 2026-01-15T22:01:21.281240267Z
review_status: UNREVIEWED

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions