A flaw was found in the Observability Operator. The Operator creates a ServiceAccount with *ClusterRole* upon deployment of the *Namespace-Scoped* Custom Resource MonitorStack. This issue allows an adversarial Kubernetes Account with only namespaced-level roles, for example, a tenant controlling a namespace, to create a MonitorStack in the authorized namespace and then elevate permission to the cluster level by impersonating the ServiceAccount created by the Operator, resulting in privilege escalation and other issues.
References
Configurations
No configuration.
History
12 Nov 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-12 17:15
Updated : 2025-11-14 16:42
NVD link : CVE-2025-2843
Mitre link : CVE-2025-2843
CVE.ORG link : CVE-2025-2843
JSON object : View
Products Affected
No product.
CWE
CWE-266
Incorrect Privilege Assignment
