Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68476: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kedacore keda

0
High
VulnerabilityCVE-2025-68476cvecve-2025-68476cwe-22cwe-863
Published: Mon Dec 22 2025 (12/22/2025, 21:35:00 UTC)
Source: CVE Database V5
Vendor/Project: kedacore
Product: keda

Description

KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.

AI-Powered Analysis

AILast updated: 12/22/2025, 22:12:26 UTC

Technical Analysis

CVE-2025-68476 is a path traversal vulnerability (CWE-22) in the KEDA autoscaling component for Kubernetes, specifically impacting the handling of TriggerAuthentication resources that configure HashiCorp Vault authentication. The vulnerability arises from insufficient validation of the pathname used to load the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker who can create or modify TriggerAuthentication resources can exploit this flaw to read arbitrary files from the node's filesystem where the KEDA pod runs. This is achieved by manipulating the Vault authentication request to exfiltrate file contents to an attacker-controlled server. The vulnerability does not require user interaction and can be exploited remotely if the attacker has the necessary Kubernetes resource permissions (PR:H). The impact is high due to the potential disclosure of sensitive information such as secrets, keys, or system files, which could facilitate further attacks or compromise. The vulnerability affects KEDA versions prior to 2.17.3 and versions from 2.18.0 up to but not including 2.18.3. The issue has been addressed in versions 2.17.3 and 2.18.3 by improving path validation controls. No known exploits are currently reported in the wild, but the high CVSS score of 8.2 reflects the criticality of the flaw given the sensitive nature of the data accessible and the ease of exploitation by authorized users. Organizations using KEDA in Kubernetes environments with Vault integration should prioritize patching and review RBAC policies to limit TriggerAuthentication resource modifications.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data within Kubernetes clusters, particularly those leveraging KEDA for autoscaling and integrating with HashiCorp Vault for secret management. Successful exploitation can lead to the disclosure of critical system files and secrets, potentially enabling lateral movement, privilege escalation, or disruption of services. This is especially impactful for sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure. The exposure of secrets or keys could also violate GDPR mandates on data security and breach notification. Additionally, organizations relying on multi-tenant Kubernetes clusters or managed cloud services may face increased risk if attackers gain resource modification permissions. The vulnerability could undermine trust in cloud-native deployments and complicate compliance efforts. Given the widespread adoption of Kubernetes and Vault in Europe, the threat could affect a broad range of enterprises and public sector entities.

Mitigation Recommendations

1. Upgrade all KEDA deployments to versions 2.17.3 or 2.18.3 or later, where the vulnerability is patched. 2. Implement strict Role-Based Access Control (RBAC) policies to restrict who can create or modify TriggerAuthentication resources, limiting this capability to trusted administrators only. 3. Audit existing TriggerAuthentication resources for suspicious configurations or unauthorized changes. 4. Monitor Kubernetes API server logs and Vault authentication requests for anomalous activity indicative of exploitation attempts. 5. Employ network segmentation and egress filtering to prevent unauthorized exfiltration of data from Kubernetes nodes. 6. Use Kubernetes admission controllers or policy engines (e.g., OPA/Gatekeeper) to enforce validation rules on TriggerAuthentication resources. 7. Regularly review and rotate secrets stored in Vault to minimize the impact of potential leaks. 8. Educate DevOps and security teams about the risks associated with resource permissions and the importance of patch management in cloud-native environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-18T13:52:15.491Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6949bf39edc45005c15e34dd

Added to database: 12/22/2025, 9:59:21 PM

Last enriched: 12/22/2025, 10:12:26 PM

Last updated: 12/23/2025, 7:09:26 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats