Home

Description

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 1.0.0 to 1.10.0, the Tekton Pipelines git resolver in API mode sends the system-configured Git API token to a user-controlled serverURL when the user omits the token parameter. A tenant with TaskRun or PipelineRun create permission can exfiltrate the shared API token (GitHub PAT, GitLab token, etc.) by pointing serverURL to an attacker-controlled endpoint.

PUBLISHED Reserved 2026-04-09 | Published 2026-04-21 | Updated 2026-04-21 | Assigner GitHub_M




HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

Problem types

CWE-201: Insertion of Sensitive Information Into Sent Data

Product status

>= 1.0.0, <= 1.10.0
affected

References

github.com/...peline/security/advisories/GHSA-wjxp-xrpv-xpff

github.com/tektoncd/pipeline/issues/9608

github.com/tektoncd/pipeline/issues/9609

cve.org (CVE-2026-40161)

nvd.nist.gov (CVE-2026-40161)

Download JSON