LakeFS's S3 gateway does not validate timestamps in authenticated requests, allowing replay attacks. An attacker who captures a valid signed request (e.g., through network interception, logs, or compromised systems) can replay that request until credentials are rotated, even after the request is intended to expire.
This issue affects all versions of lakeFS up to and including v1.74.4.
The vulnerability has been fixed in version v1.75.0.
Users should upgrade to version v1.75.0.
Until upgraded, implement these mitigations:
Note: These workarounds reduce risk but do not fully eliminate the vulnerability.
{
"github_reviewed_at": "2026-01-15T21:14:55Z",
"severity": "MODERATE",
"nvd_published_at": "2026-01-15T23:15:49Z",
"cwe_ids": [
"CWE-294"
],
"github_reviewed": true
}