CVE-2026-33211

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter. A tenant with permission to create `ResolutionRequests` (e.g. by creating `TaskRuns` or `PipelineRuns` that use the git resolver) can read arbitrary files from the resolver pod's filesystem, including ServiceAccount tokens. The file contents are returned base64-encoded in `resolutionrequest.status.data`. Versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2 contain a patch.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*
cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*
cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*
cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*
cpe:2.3:a:linuxfoundation:tekton_pipelines:1.0.0:*:*:*:*:go:*:*

History

26 Mar 2026, 15:42

Type Values Removed Values Added
References () https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c - () https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34687c - Patch
References () https://github.com/tektoncd/pipeline/commit/318006c4e3a5 - () https://github.com/tektoncd/pipeline/commit/318006c4e3a5 - Patch
References () https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd - () https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf023cbd - Patch
References () https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae - () https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a75ae - Patch
References () https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e - () https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9ee5e - Patch
References () https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db - () https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107bc3db - Patch
References () https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78 - () https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9cb78 - Patch
References () https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c - () https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c - Patch, Vendor Advisory
Summary
  • (es) El proyecto Tekton Pipelines proporciona recursos estilo k8s para declarar pipelines estilo CI/CD. A partir de la versión 1.0.0 y antes de las versiones 1.0.1, 1.3.3, 1.6.1, 1.9.2 y 1.10.2, el resolvedor git de Tekton Pipelines es vulnerable a salto de ruta a través del parámetro 'pathInRepo'. Un inquilino con permiso para crear 'ResolutionRequests' (por ejemplo, creando 'TaskRuns' o 'PipelineRuns' que usan el resolvedor git) puede leer archivos arbitrarios del sistema de archivos del pod del resolvedor, incluyendo tokens de ServiceAccount. El contenido del archivo se devuelve codificado en base64 en 'resolutionrequest.status.data'. Las versiones 1.0.1, 1.3.3, 1.6.1, 1.9.2 y 1.10.2 contienen un parche.
First Time Linuxfoundation
Linuxfoundation tekton Pipelines
CPE cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*
cpe:2.3:a:linuxfoundation:tekton_pipelines:1.0.0:*:*:*:*:go:*:*

24 Mar 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 00:16

Updated : 2026-03-26 15:42


NVD link : CVE-2026-33211

Mitre link : CVE-2026-33211

CVE.ORG link : CVE-2026-33211


JSON object : View

Products Affected

linuxfoundation

  • tekton_pipelines
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')