CVE-2025-68476: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kedacore keda
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
AI Analysis
Technical Summary
CVE-2025-68476 is a path traversal vulnerability (CWE-22) in the KEDA autoscaling component for Kubernetes, specifically impacting the handling of TriggerAuthentication resources that configure HashiCorp Vault authentication. The vulnerability arises from insufficient validation of the pathname used to load the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker who can create or modify TriggerAuthentication resources can exploit this flaw to read arbitrary files from the node's filesystem where the KEDA pod runs. This is achieved by manipulating the Vault authentication request to exfiltrate file contents to an attacker-controlled server. The vulnerability does not require user interaction and can be exploited remotely if the attacker has the necessary Kubernetes resource permissions (PR:H). The impact is high due to the potential disclosure of sensitive information such as secrets, keys, or system files, which could facilitate further attacks or compromise. The vulnerability affects KEDA versions prior to 2.17.3 and versions from 2.18.0 up to but not including 2.18.3. The issue has been addressed in versions 2.17.3 and 2.18.3 by improving path validation controls. No known exploits are currently reported in the wild, but the high CVSS score of 8.2 reflects the criticality of the flaw given the sensitive nature of the data accessible and the ease of exploitation by authorized users. Organizations using KEDA in Kubernetes environments with Vault integration should prioritize patching and review RBAC policies to limit TriggerAuthentication resource modifications.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data within Kubernetes clusters, particularly those leveraging KEDA for autoscaling and integrating with HashiCorp Vault for secret management. Successful exploitation can lead to the disclosure of critical system files and secrets, potentially enabling lateral movement, privilege escalation, or disruption of services. This is especially impactful for sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure. The exposure of secrets or keys could also violate GDPR mandates on data security and breach notification. Additionally, organizations relying on multi-tenant Kubernetes clusters or managed cloud services may face increased risk if attackers gain resource modification permissions. The vulnerability could undermine trust in cloud-native deployments and complicate compliance efforts. Given the widespread adoption of Kubernetes and Vault in Europe, the threat could affect a broad range of enterprises and public sector entities.
Mitigation Recommendations
1. Upgrade all KEDA deployments to versions 2.17.3 or 2.18.3 or later, where the vulnerability is patched. 2. Implement strict Role-Based Access Control (RBAC) policies to restrict who can create or modify TriggerAuthentication resources, limiting this capability to trusted administrators only. 3. Audit existing TriggerAuthentication resources for suspicious configurations or unauthorized changes. 4. Monitor Kubernetes API server logs and Vault authentication requests for anomalous activity indicative of exploitation attempts. 5. Employ network segmentation and egress filtering to prevent unauthorized exfiltration of data from Kubernetes nodes. 6. Use Kubernetes admission controllers or policy engines (e.g., OPA/Gatekeeper) to enforce validation rules on TriggerAuthentication resources. 7. Regularly review and rotate secrets stored in Vault to minimize the impact of potential leaks. 8. Educate DevOps and security teams about the risks associated with resource permissions and the importance of patch management in cloud-native environments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-68476: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kedacore keda
Description
KEDA is a Kubernetes-based Event Driven Autoscaling component. Prior to versions 2.17.3 and 2.18.3, an Arbitrary File Read vulnerability has been identified in KEDA, potentially affecting any KEDA resource that uses TriggerAuthentication to configure HashiCorp Vault authentication. The vulnerability stems from an incorrect or insufficient path validation when loading the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker with permissions to create or modify a TriggerAuthentication resource can exfiltrate the content of any file from the node's filesystem (where the KEDA pod resides) by directing the file's content to a server under their control, as part of the Vault authentication request. The potential impact includes the exfiltration of sensitive system information, such as secrets, keys, or the content of files like /etc/passwd. This issue has been patched in versions 2.17.3 and 2.18.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-68476 is a path traversal vulnerability (CWE-22) in the KEDA autoscaling component for Kubernetes, specifically impacting the handling of TriggerAuthentication resources that configure HashiCorp Vault authentication. The vulnerability arises from insufficient validation of the pathname used to load the Service Account Token specified in spec.hashiCorpVault.credential.serviceAccount. An attacker who can create or modify TriggerAuthentication resources can exploit this flaw to read arbitrary files from the node's filesystem where the KEDA pod runs. This is achieved by manipulating the Vault authentication request to exfiltrate file contents to an attacker-controlled server. The vulnerability does not require user interaction and can be exploited remotely if the attacker has the necessary Kubernetes resource permissions (PR:H). The impact is high due to the potential disclosure of sensitive information such as secrets, keys, or system files, which could facilitate further attacks or compromise. The vulnerability affects KEDA versions prior to 2.17.3 and versions from 2.18.0 up to but not including 2.18.3. The issue has been addressed in versions 2.17.3 and 2.18.3 by improving path validation controls. No known exploits are currently reported in the wild, but the high CVSS score of 8.2 reflects the criticality of the flaw given the sensitive nature of the data accessible and the ease of exploitation by authorized users. Organizations using KEDA in Kubernetes environments with Vault integration should prioritize patching and review RBAC policies to limit TriggerAuthentication resource modifications.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive data within Kubernetes clusters, particularly those leveraging KEDA for autoscaling and integrating with HashiCorp Vault for secret management. Successful exploitation can lead to the disclosure of critical system files and secrets, potentially enabling lateral movement, privilege escalation, or disruption of services. This is especially impactful for sectors with stringent data protection requirements such as finance, healthcare, and critical infrastructure. The exposure of secrets or keys could also violate GDPR mandates on data security and breach notification. Additionally, organizations relying on multi-tenant Kubernetes clusters or managed cloud services may face increased risk if attackers gain resource modification permissions. The vulnerability could undermine trust in cloud-native deployments and complicate compliance efforts. Given the widespread adoption of Kubernetes and Vault in Europe, the threat could affect a broad range of enterprises and public sector entities.
Mitigation Recommendations
1. Upgrade all KEDA deployments to versions 2.17.3 or 2.18.3 or later, where the vulnerability is patched. 2. Implement strict Role-Based Access Control (RBAC) policies to restrict who can create or modify TriggerAuthentication resources, limiting this capability to trusted administrators only. 3. Audit existing TriggerAuthentication resources for suspicious configurations or unauthorized changes. 4. Monitor Kubernetes API server logs and Vault authentication requests for anomalous activity indicative of exploitation attempts. 5. Employ network segmentation and egress filtering to prevent unauthorized exfiltration of data from Kubernetes nodes. 6. Use Kubernetes admission controllers or policy engines (e.g., OPA/Gatekeeper) to enforce validation rules on TriggerAuthentication resources. 7. Regularly review and rotate secrets stored in Vault to minimize the impact of potential leaks. 8. Educate DevOps and security teams about the risks associated with resource permissions and the importance of patch management in cloud-native environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-18T13:52:15.491Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6949bf39edc45005c15e34dd
Added to database: 12/22/2025, 9:59:21 PM
Last enriched: 12/22/2025, 10:12:26 PM
Last updated: 12/23/2025, 7:09:26 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.