A Stored Cross-Site Scripting (XSS) vulnerability in the RustFS Console allows an attacker to execute arbitrary JavaScript in the context of the management console. By bypassing the PDF preview logic, an attacker can steal administrator credentials from localStorage, leading to full account takeover and system compromise.
The vulnerability exists due to improper validation of the response content type during the file preview process and a lack of origin separation between the S3 object delivery and the management console.
localStorage.
console/components/object/preview-modal.vue, the application identifies a PDF file based on its extension or metadata and renders it using an <iframe>.xss.pdf but set its Content-Type metadata to text/html. Because the iframe is hosted on the same origin as the console, the executed script has unrestricted access to the parent window's localStorage.<img width="6006" height="3096" alt="CleanShot 2026-02-01 at 18 36 54@2x"...
1.0.0-alpha.83Exploitability
AV:NAC:LPR:LUI:RScope
S:CImpact
C:HI:HA:H9.0/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H