Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22728: CWE-284 in Bitnami sealed-secrets

0
Medium
VulnerabilityCVE-2026-22728cvecve-2026-22728cwe-284
Published: Thu Feb 26 2026 (02/26/2026, 00:50:00 UTC)
Source: CVE Database V5
Vendor/Project: Bitnami
Product: sealed-secrets

Description

Bitnami Sealed Secrets is vulnerable to a scope-widening attack during the secret rotation (/v1/rotate) flow. The rotation handler derives the sealing scope for the newly encrypted output from untrusted spec.template.metadata.annotations present in the input SealedSecret. By submitting a victim SealedSecret to the rotate endpoint with the annotation sealedsecrets.bitnami.com/cluster-wide=true injected into the template metadata, a remote attacker can obtain a rotated version of the secret that is cluster-wide. This bypasses original "strict" or "namespace-wide" constraints, allowing the attacker to retarget and unseal the secret in any namespace or under any name to recover the plaintext credentials.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:15:54 UTC

Technical Analysis

Bitnami Sealed Secrets is a Kubernetes controller and tool used to encrypt secrets into 'SealedSecrets' that can be safely stored in version control and decrypted only by the controller running inside the cluster. CVE-2026-22728 affects version 0.35.0 of this product and involves a scope-widening vulnerability during the secret rotation flow accessed via the /v1/rotate API endpoint. The rotation handler incorrectly trusts the spec.template.metadata.annotations field from the input SealedSecret, which is user-controlled and untrusted. By injecting the annotation sealedsecrets.bitnami.com/cluster-wide=true, an attacker can cause the rotation process to produce a sealed secret with cluster-wide scope rather than the intended strict or namespace-wide scope. This effectively bypasses the original scoping restrictions, allowing the attacker to retarget the rotated secret to any namespace or name within the cluster. Consequently, the attacker can decrypt the secret and obtain plaintext credentials that should have been limited in scope. The vulnerability is classified under CWE-284 (Improper Access Control) and has a CVSS 3.1 base score of 4.9, reflecting medium severity. Exploitation requires the attacker to have high privileges (likely cluster or namespace admin) to submit the secret for rotation but does not require user interaction. There are no known public exploits or patches at the time of publication, and the issue was reserved in early 2026 and published in February 2026.

Potential Impact

The primary impact of this vulnerability is the unauthorized disclosure of sensitive secrets within Kubernetes clusters using Bitnami Sealed Secrets 0.35.0. By escalating the scope of sealed secrets from namespace or strict to cluster-wide, an attacker with sufficient privileges can decrypt secrets across namespaces, potentially exposing credentials, tokens, or other sensitive data. This can lead to lateral movement within the cluster, privilege escalation, and compromise of critical workloads. Organizations relying on sealed secrets for secure secret management may have their confidentiality guarantees undermined, increasing the risk of data breaches. Since the vulnerability does not affect integrity or availability, the main concern is loss of confidentiality. The requirement for high privileges limits exploitation to insiders or attackers who have already compromised cluster administrative credentials, but the impact in such cases is significant. The lack of user interaction and network accessibility of the rotate endpoint increases the risk in environments where privilege boundaries are not strictly enforced.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit and restrict access to the /v1/rotate endpoint and ensure that only trusted, authorized users or service accounts with minimal necessary privileges can perform secret rotations. Implement strict admission controls and validation on SealedSecret resources to prevent injection of unauthorized annotations, particularly sealedsecrets.bitnami.com/cluster-wide=true. Until an official patch is released, consider disabling or restricting the secret rotation feature if feasible. Monitor audit logs for suspicious rotation requests or unexpected changes in secret scopes. Employ network segmentation and role-based access control (RBAC) to limit who can submit SealedSecrets for rotation. Additionally, review and rotate any secrets that may have been exposed due to this vulnerability. Stay updated with Bitnami’s advisories for patches or updates addressing this issue and apply them promptly once available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:41.497Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699fa148b7ef31ef0b77969a

Added to database: 2/26/2026, 1:26:32 AM

Last enriched: 3/5/2026, 11:15:54 AM

Last updated: 4/12/2026, 5:35:01 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses