Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-77v3-r3jw-j2v2

Опубликовано: 20 янв. 2026
Источник: github
Github: Прошло ревью
CVSS4: 9.3

Описание

External Secrets Operator insecurely retrieves secrets through the getSecretKey templating function

Summary

The getSecretKey template function, while introduced for senhasegura Devops Secrets Management (DSM) provider, has the ability to fetch secrets cross-namespaces with the roleBinding of the external-secrets controller, bypassing our security mechanisms.

This function was completely removed, as everything done with that templating function can be done in a different way while respecting our safeguards (for example, using sourceRef like explained here: https://github.com/external-secrets/external-secrets/issues/5690#issuecomment-3630977865)

Impact

  • Cross-namespace secret access: Attackers or misconfigured resources could retrieve secrets from namespaces other than the one intended.
  • privilege escalation: Unauthorized access to secrets could lead to privilege escalation, data exfiltration, or compromise of service accounts and credentials.

Resolution

We removed the incriminated templating function from our codebase. All users should upgrade to the latest version containing this fix.

Workarounds

Use a policy engine such as Kubernetes, Kyverno, Kubewarden, or OPA to prevent the usage of getSecretKey in any ExternalSecret resource.

Details

See also:

Пакеты

Наименование

github.com/external-secrets/external-secrets

go
Затронутые версииВерсия исправления

>= 0.20.2, < 1.2.0

1.2.0

EPSS

Процентиль: 2%
0.00014
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-863

Связанные уязвимости

nvd
16 дней назад

External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Starting in version 0.20.2 and prior to version 1.2.0, the `getSecretKey` template function, while introduced for senhasegura Devops Secrets Management (DSM) provider, has the ability to fetch secrets cross-namespaces with the roleBinding of the external-secrets controller, bypassing our security mechanisms. This function was completely removed in version 1.2.0, as everything done with that templating function can be done in a different way while respecting External Secrets Operator's safeguards As a workaround, use a policy engine such as Kubernetes, Kyverno, Kubewarden, or OPA to prevent the usage of `getSecretKey` in any ExternalSecret resource.

EPSS

Процентиль: 2%
0.00014
Низкий

9.3 Critical

CVSS4

Дефекты

CWE-863