Vulnerability Details CVE-2026-43001
An issue was discovered in OpenStack Keystone 13 through 29. POST /v3/credentials did not validate that the caller-supplied project_id for an EC2-type credential matched the project of the authenticating application credential. This allowed an attacker holding an unrestricted application credential for project A to create an EC2 credential targeting project B; a subsequent /v3/ec2tokens exchange would then issue a Keystone token scoped to project B while still carrying the original app_cred_id, enabling cross-project lateral movement within the credential owner's role footprint.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 1.8%
CVSS Severity
CVSS v3 Score 7.9
Products affected by CVE-2026-43001
-
cpe:2.3:a:openstack:keystone:13.0.0
-
cpe:2.3:a:openstack:keystone:13.0.1
-
cpe:2.3:a:openstack:keystone:13.0.2
-
cpe:2.3:a:openstack:keystone:14.0.0
-
cpe:2.3:a:openstack:keystone:14.0.1
-
cpe:2.3:a:openstack:keystone:14.1.0
-
cpe:2.3:a:openstack:keystone:15.0.0
-
cpe:2.3:a:openstack:keystone:15.0.1
-
cpe:2.3:a:openstack:keystone:16.0.0
-
cpe:2.3:a:openstack:keystone:16.0.0.0
-
cpe:2.3:a:openstack:keystone:16.0.1
-
cpe:2.3:a:openstack:keystone:16.0.2
-
cpe:2.3:a:openstack:keystone:17.0.0
-
cpe:2.3:a:openstack:keystone:17.0.0.0
-
cpe:2.3:a:openstack:keystone:17.0.1
-
cpe:2.3:a:openstack:keystone:18.0.0
-
cpe:2.3:a:openstack:keystone:18.0.0.0
-
cpe:2.3:a:openstack:keystone:18.0.1
-
cpe:2.3:a:openstack:keystone:19.0.0