We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-47282

Malicious google credential in DNS secret can lead to privilege escalation



Description

Gardener External DNS Management is an environment to manage external DNS entries for a kubernetes cluster. A security vulnerability was discovered in Gardener's External DNS Management prior to version 0.23.6 that could allow a user with administrative privileges for a Gardener project or a user with administrative privileges for a shoot cluster, including administrative privileges for a single namespace of the shoot cluster, to obtain control over the seed cluster where the shoot cluster is managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. The affected component is `gardener/external-dns-management`. The `external-dns-management` component may also be deployed on the seeds by the `gardener/gardener-extension-shoot-dns-service` extension when the extension is enabled. In this case, all versions of the `shoot-dns-service` extension `<= v1.60.0` are affected by this vulnerability. Version 0.23.6 of Gardener External DNS Management fixes the issue.

Reserved 2025-05-05 | Published 2025-05-19 | Updated 2025-05-20 | Assigner GitHub_M


CRITICAL: 9.9CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Problem types

CWE-20: Improper Input Validation

Product status

< 0.23.6
affected

References

github.com/...gement/security/advisories/GHSA-xwgg-m7fx-83wx

cve.org (CVE-2025-47282)

nvd.nist.gov (CVE-2025-47282)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-47282

Support options

Helpdesk Chat, Email, Knowledgebase