Home

Description

Bitnami Sealed Secrets is vulnerable to a scope-widening attack during the secret rotation (/v1/rotate) flow. The rotation handler derives the sealing scope for the newly encrypted output from untrusted spec.template.metadata.annotations present in the input SealedSecret. By submitting a victim SealedSecret to the rotate endpoint with the annotation sealedsecrets.bitnami.com/cluster-wide=true injected into the template metadata, a remote attacker can obtain a rotated version of the secret that is cluster-wide. This bypasses original "strict" or "namespace-wide" constraints, allowing the attacker to retarget and unseal the secret in any namespace or under any name to recover the plaintext credentials.

PUBLISHED Reserved 2026-01-09 | Published 2026-02-26 | Updated 2026-02-26 | Assigner vmware




MEDIUM: 4.9CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-284

Product status

Default status
unaffected

0.35.0 (custom) before <0.36.0
affected

References

github.com/...ecrets/security/advisories/GHSA-465p-v42x-3fmj

cve.org (CVE-2026-22728)

nvd.nist.gov (CVE-2026-22728)

Download JSON