Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors. The default behavior exists to make the “getting started” experience smooth: new users can experiment with Pepr and create resources dynamically without needing to pre-configure RBAC. This vulnerability is fixed in 1.0.5.
CVSS
No CVSS.
References
| Link | Resource |
|---|---|
| https://github.com/defenseunicorns/pepr/releases/tag/v1.0.5 | Release Notes |
| https://github.com/defenseunicorns/pepr/security/advisories/GHSA-w54x-r83c-x79q | Vendor Advisory |
Configurations
History
04 Mar 2026, 14:43
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/defenseunicorns/pepr/releases/tag/v1.0.5 - Release Notes | |
| References | () https://github.com/defenseunicorns/pepr/security/advisories/GHSA-w54x-r83c-x79q - Vendor Advisory | |
| First Time |
Defenseunicorns
Defenseunicorns pepr |
|
| CPE | cpe:2.3:a:defenseunicorns:pepr:*:*:*:*:*:*:*:* |
16 Jan 2026, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-16 20:15
Updated : 2026-03-04 14:43
NVD link : CVE-2026-23634
Mitre link : CVE-2026-23634
CVE.ORG link : CVE-2026-23634
JSON object : View
Products Affected
defenseunicorns
- pepr
CWE
CWE-272
Least Privilege Violation
