Home

Description

External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Prior to 2.4.1, a user who only has permission to create ExternalSecret resources can cause the operator to create a Secret that Kubernetes will automatically populate with a long-lived token for the specified service account. This effectively allows the user to impersonate any service account in the namespace without needing direct create permissions on TokenRequest or Secrets of that type. This vulnerability is fixed in 2.4.1.

PUBLISHED Reserved 2026-04-30 | Published 2026-05-11 | Updated 2026-05-11 | Assigner GitHub_M




MEDIUM: 4.9CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N

Problem types

CWE-285: Improper Authorization

Product status

< 2.4.1
affected

References

github.com/...ecrets/security/advisories/GHSA-fq7h-9x26-6j22

github.com/...ommit/4ddd240af7fe88725d9857b9a0c198073502e288

github.com/...l-secrets/external-secrets/releases/tag/v2.4.1

cve.org (CVE-2026-42876)

nvd.nist.gov (CVE-2026-42876)

Download JSON