top of page
perceptive_background_267k.jpg

kubernetes-el Compromised: How a Pwn Request Exploited a Popular Emacs Package

Published:

9 maart 2026 om 14:44:52

Alert date:

9 maart 2026 om 15:03:25

Source:

stepsecurity.io

Click to open the original link from this advisory

Supply Chain & Dependencies, Cloud & Virtualization

On March 5, 2026, a threat actor exploited a Pwn Request vulnerability in the CI workflow of kubernetes-el, a popular Emacs package for Kubernetes management. The attack resulted in theft of GITHUB_TOKEN with full write permissions, exfiltration of CI/CD secrets, repository defacement, and injection of destructive code. This supply chain attack demonstrates the risks of unsecured CI/CD workflows in open source projects.

Technical details

Mitigation steps:

Affected products:

kubernetes-el
Emacs
GitHub Actions

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page