Home

Description

External Secrets Operator is a Kubernetes operator that integrates external secret management systems. From version 0.15.0 to before 0.19.2, a vulnerability was discovered where the List() calls for Kubernetes Secret and SecretStore resources performed by the PushSecret controller did not apply a namespace selector. This flaw allowed an attacker to use label selectors to list and read secrets/secret-stores across the cluster, bypassing intended namespace restrictions. An attacker with the ability to create or update PushSecret resources and control SecretStore configurations could exploit this vulnerability to exfiltrate sensitive data from arbitrary namespaces. This could lead to full disclosure of Kubernetes secrets, including credentials, tokens, and other sensitive information stored in the cluster. This vulnerability has been patched in version 0.19.2. A workaround for this issue includes auditing and restricting RBAC permissions so that only trusted service accounts can create or update PushSecret and SecretStore resources.

PUBLISHED Reserved 2025-08-08 | Published 2025-08-13 | Updated 2025-08-14 | Assigner GitHub_M




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-284: Improper Access Control

Product status

>= 0.15.0, < 0.19.2
affected

References

github.com/...ecrets/security/advisories/GHSA-fcxq-v2r3-cc8h

github.com/external-secrets/external-secrets/pull/5109

github.com/external-secrets/external-secrets/pull/5133

github.com/...ommit/39cdba5863533007b582dc63dd300839326b2f1d

github.com/...ommit/de40e8f4fa9559c1d770bb674589b285da5ef2d1

cve.org (CVE-2025-55196)

nvd.nist.gov (CVE-2025-55196)

Download JSON