CVE-2026-25542
⚪ Do wiadomości
Błąd w Tekton Pipelines pozwala na obejście polityk weryfikacji zasobów przez atakującego.
CVSS
6.5
EPSS
0.0%
Exploit
poc
Vendor
linuxfoundation
Opis źródłowy (NVD)
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. From 0.43.0 to 1.11.0, trusted resources verification policies match a resource source string (refSource.URI) against spec.resources[].pattern using regexp.MatchString. In Go, regexp.MatchString reports a match if the pattern matches anywhere in the string, so common unanchored patterns (including examples in tekton documentation) can be bypassed by attacker-controlled source strings that contain the trusted pattern as a substring. This can cause an unintended policy match and change which verification mode/keys apply.
exploit
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 6.5 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-04-21 17:16:24 UTC |
| Ostatnia modyfikacja (NVD) | 2026-05-01 16:33:50 UTC |
Referencje
- https://github.com/tektoncd/pipeline/commit/b8905600322aa86327baae0a7c04d6cf1207362a (security-advisories@github.com) [Patch]
- https://github.com/tektoncd/pipeline/security/advisories/GHSA-rmx9-2pp3-xhcr (security-advisories@github.com) [Exploit, Vendor Advisory]