Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59823: CWE-94: Improper Control of Generation of Code ('Code Injection') in gardener gardener-extension-provider-aws

0
Critical
VulnerabilityCVE-2025-59823cvecve-2025-59823cwe-94
Published: Thu Sep 25 2025 (09/25/2025, 14:17:37 UTC)
Source: CVE Database V5
Vendor/Project: gardener
Product: gardener-extension-provider-aws

Description

Project Gardener implements the automated management and operation of Kubernetes clusters as a service. Code injection may be possible in Gardener Extensions for AWS providers prior to version 1.64.0, Azure providers prior to version 1.55.0, OpenStack providers prior to version 1.49.0, and GCP providers prior to version 1.46.0. This vulnerability could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster where the shoot cluster is managed. This affects all Gardener installations where Terraformer is used/can be enabled for infrastructure provisioning with any of the affected components. This issue has been patched in Gardener Extensions for AWS providers version 1.64.0, Azure providers version 1.55.0, OpenStack providers version 1.49.0, and GCP providers version 1.46.0.

AI-Powered Analysis

AILast updated: 10/03/2025, 00:33:07 UTC

Technical Analysis

CVE-2025-59823 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code, commonly known as code injection) affecting the Gardener project, specifically its extensions for AWS, Azure, OpenStack, and GCP providers. Gardener is an open-source project designed to automate the management and operation of Kubernetes clusters as a service. The vulnerability exists in versions prior to 1.64.0 for AWS, 1.55.0 for Azure, 1.49.0 for OpenStack, and 1.46.0 for GCP providers. It arises from improper handling of code generation within the Gardener Extensions when Terraformer is used or can be enabled for infrastructure provisioning. A user with administrative privileges on a Gardener project could exploit this flaw to inject malicious code, thereby gaining control over the seed cluster that manages the shoot clusters. This control could lead to full compromise of the cluster infrastructure, allowing attackers to manipulate cluster operations, exfiltrate sensitive data, or disrupt availability. The vulnerability has been patched in the specified versions, and no known exploits are currently reported in the wild. The CVSS v3.0 score of 9.9 reflects the critical nature of this vulnerability, indicating network attack vector, low attack complexity, privileges required, no user interaction, and a scope change with high impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations leveraging Gardener for Kubernetes cluster management, this vulnerability poses a severe risk. Compromise of the seed cluster could cascade to all managed shoot clusters, potentially affecting multiple business-critical applications and services. Given the widespread adoption of Kubernetes and cloud infrastructure in Europe, especially in sectors like finance, manufacturing, and public services, an attacker could disrupt operations, steal sensitive data, or manipulate infrastructure configurations. The ability to execute code injection remotely with administrative privileges means insider threats or compromised admin accounts could lead to full cluster takeover. This could result in significant operational downtime, regulatory non-compliance (e.g., GDPR breaches), and reputational damage. Organizations using multi-cloud or hybrid cloud environments with Gardener extensions for AWS, Azure, OpenStack, or GCP are particularly at risk.

Mitigation Recommendations

European organizations should immediately audit their Gardener installations to identify affected versions of the gardener-extension-provider components. Upgrading to the patched versions (AWS >=1.64.0, Azure >=1.55.0, OpenStack >=1.49.0, GCP >=1.46.0) is critical. Additionally, restrict administrative privileges rigorously to minimize the risk of privilege abuse. Implement strong authentication and authorization controls, including multi-factor authentication for Gardener project admins. Monitor Terraformer usage and infrastructure provisioning activities for anomalous behavior indicative of code injection attempts. Employ network segmentation to isolate seed clusters from less trusted networks and enforce strict access controls. Regularly review and audit cluster logs and configurations for unauthorized changes. Consider deploying runtime security tools that can detect and block suspicious code execution within Kubernetes clusters. Finally, maintain an incident response plan tailored to Kubernetes infrastructure compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-09-22T14:34:03.470Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 68d5511823f14e593ee333af

Added to database: 9/25/2025, 2:26:32 PM

Last enriched: 10/3/2025, 12:33:07 AM

Last updated: 10/7/2025, 12:50:55 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats