CVE-2026-23634

Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors. The default behavior exists to make the “getting started” experience smooth: new users can experiment with Pepr and create resources dynamically without needing to pre-configure RBAC. This vulnerability is fixed in 1.0.5.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:defenseunicorns:pepr:*:*:*:*:*:*:*:*

History

04 Mar 2026, 14:43

Type Values Removed Values Added
References () https://github.com/defenseunicorns/pepr/releases/tag/v1.0.5 - () https://github.com/defenseunicorns/pepr/releases/tag/v1.0.5 - Release Notes
References () https://github.com/defenseunicorns/pepr/security/advisories/GHSA-w54x-r83c-x79q - () https://github.com/defenseunicorns/pepr/security/advisories/GHSA-w54x-r83c-x79q - Vendor Advisory
First Time Defenseunicorns
Defenseunicorns pepr
CPE cpe:2.3:a:defenseunicorns:pepr:*:*:*:*:*:*:*:*

16 Jan 2026, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-16 20:15

Updated : 2026-03-04 14:43


NVD link : CVE-2026-23634

Mitre link : CVE-2026-23634

CVE.ORG link : CVE-2026-23634


JSON object : View

Products Affected

defenseunicorns

  • pepr
CWE
CWE-272

Least Privilege Violation