OpenStack Keystone v3 EC2/S3 Token Abuse via Valid AWS Auth (pre-26.0.1/27/28)
CVE-2025-65073 Published on November 17, 2025
OpenStack Keystone before 26.0.1, 27.0.0, and 28.0.0 allows a /v3/ec2tokens or /v3/s3tokens request with a valid AWS Signature to provide Keystone authorization.
Weakness Type
What is an AuthZ Vulnerability?
The software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.
CVE-2025-65073 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2025-65073
stack.watch emails you whenever new vulnerabilities are published in OpenStack Keystone or Canonical Ubuntu Linux. Just hit a watch button to start following.
Affected Versions
OpenStack Keystone:- Before 26.0.1 is affected.
- Version 27.0.0 is affected.
- Version 28.0.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.