top of page
perceptive_background_267k.jpg

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, …

Published:

23 maart 2026 om 23:00:00

Alert date:

24 maart 2026 om 09:16:39

Source:

nvd.nist.gov

Click to open the original link from this advisory

Cloud & Virtualization, Supply Chain & Dependencies

CVE-2026-33211 affects Tekton Pipelines git resolver in versions 1.0.0 through multiple branches prior to patched versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2. The vulnerability allows path traversal attacks via the pathInRepo parameter, enabling tenants with ResolutionRequest creation permissions to read arbitrary files from the resolver pod's filesystem. This includes sensitive ServiceAccount tokens, with file contents returned base64-encoded in resolutionrequest.status.data. The vulnerability can be exploited by creating TaskRuns or PipelineRuns that use the git resolver. Multiple patched versions are available across different release branches.

Technical details

Mitigation steps:

Affected products:

Tekton Pipelines

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page