Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22728: CWE-284 in Bitnami sealed-secrets

0
Medium
VulnerabilityCVE-2026-22728cvecve-2026-22728cwe-284
Published: Thu Feb 26 2026 (02/26/2026, 00:50:00 UTC)
Source: CVE Database V5
Vendor/Project: Bitnami
Product: sealed-secrets

Description

CVE-2026-22728 is a medium severity vulnerability in Bitnami Sealed Secrets version 0. 35. 0 that allows a scope-widening attack during the secret rotation process. An attacker with high privileges can manipulate the annotations in a SealedSecret to escalate the scope of the rotated secret to cluster-wide, bypassing namespace restrictions. This enables the attacker to unseal secrets in any namespace or under any name, potentially exposing plaintext credentials. The vulnerability stems from improper authorization checks (CWE-284) in the rotation handler that trusts unvalidated input annotations. Exploitation requires authenticated access and no user interaction is needed. There are no known exploits in the wild, and no patches have been linked yet. Organizations using Bitnami Sealed Secrets 0. 35.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:43:35 UTC

Technical Analysis

Bitnami Sealed Secrets is a Kubernetes controller that encrypts secrets so they can be safely stored in version control. In version 0.35.0, the secret rotation endpoint (/v1/rotate) contains a vulnerability (CVE-2026-22728) classified under CWE-284 (Improper Access Control). During secret rotation, the handler derives the sealing scope for the new encrypted secret from the annotations in the input SealedSecret's template metadata. However, these annotations are untrusted user input and can be manipulated. By injecting the annotation sealedsecrets.bitnami.com/cluster-wide=true, an attacker with authenticated access to the rotate endpoint can escalate the scope of the rotated secret from namespace-restricted to cluster-wide. This bypasses the original strict or namespace-wide constraints, allowing the attacker to retarget and unseal the secret in any namespace or under any name, thereby recovering plaintext credentials. The vulnerability requires high privileges (authenticated user) but no user interaction. The CVSS v3.1 base score is 4.9 (medium), reflecting network attack vector, low attack complexity, required privileges, and high confidentiality impact without integrity or availability impact. No patches have been published yet, and no known exploits are reported in the wild. This flaw highlights the risk of trusting unvalidated metadata in Kubernetes controllers managing sensitive data.

Potential Impact

The primary impact of CVE-2026-22728 is unauthorized disclosure of sensitive secrets stored in Kubernetes clusters using Bitnami Sealed Secrets 0.35.0. By exploiting this vulnerability, an attacker with authenticated access to the secret rotation endpoint can escalate the scope of secrets from namespace-limited to cluster-wide. This allows the attacker to decrypt secrets across namespaces, potentially exposing credentials, API keys, or other sensitive configuration data. Such exposure can lead to lateral movement within the cluster, privilege escalation, and compromise of critical workloads. Organizations relying on sealed-secrets for secure secret management face increased risk of data breaches and operational disruption. Although exploitation requires authenticated access, the widespread use of Kubernetes and Bitnami Sealed Secrets in cloud-native environments means many organizations globally could be affected. The vulnerability undermines the confidentiality guarantees of sealed-secrets, impacting trust in secret management workflows.

Mitigation Recommendations

To mitigate CVE-2026-22728, organizations should: 1) Restrict access to the /v1/rotate endpoint to only highly trusted and authenticated users or service accounts, minimizing the attack surface. 2) Implement strict RBAC policies in Kubernetes to limit who can invoke secret rotation operations. 3) Monitor and audit usage of the rotate endpoint and SealedSecret annotations for suspicious or unauthorized modifications, especially the sealedsecrets.bitnami.com/cluster-wide annotation. 4) Avoid using version 0.35.0 of Bitnami Sealed Secrets until an official patch is released; upgrade to a fixed version once available. 5) Consider additional encryption or access controls external to sealed-secrets for highly sensitive secrets. 6) Review and validate all input metadata in secret rotation workflows to prevent injection of unauthorized annotations. 7) Employ network segmentation and zero-trust principles to limit exposure of Kubernetes API endpoints. These targeted measures go beyond generic advice by focusing on controlling access to the vulnerable rotation functionality and monitoring for exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:41.497Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699fa148b7ef31ef0b77969a

Added to database: 2/26/2026, 1:26:32 AM

Last enriched: 2/26/2026, 1:43:35 AM

Last updated: 2/26/2026, 11:30:02 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats