CVE-2026-22728: CWE-284 in Bitnami sealed-secrets
CVE-2026-22728 is a medium severity vulnerability in Bitnami Sealed Secrets version 0. 35. 0 that allows a scope-widening attack during the secret rotation process. An attacker with high privileges can manipulate the annotations in a SealedSecret to escalate the scope of the rotated secret to cluster-wide, bypassing namespace restrictions. This enables the attacker to unseal secrets in any namespace or under any name, potentially exposing plaintext credentials. The vulnerability stems from improper authorization checks (CWE-284) in the rotation handler that trusts unvalidated input annotations. Exploitation requires authenticated access and no user interaction is needed. There are no known exploits in the wild, and no patches have been linked yet. Organizations using Bitnami Sealed Secrets 0. 35.
AI Analysis
Technical Summary
Bitnami Sealed Secrets is a Kubernetes controller that encrypts secrets so they can be safely stored in version control. In version 0.35.0, the secret rotation endpoint (/v1/rotate) contains a vulnerability (CVE-2026-22728) classified under CWE-284 (Improper Access Control). During secret rotation, the handler derives the sealing scope for the new encrypted secret from the annotations in the input SealedSecret's template metadata. However, these annotations are untrusted user input and can be manipulated. By injecting the annotation sealedsecrets.bitnami.com/cluster-wide=true, an attacker with authenticated access to the rotate endpoint can escalate the scope of the rotated secret from namespace-restricted to cluster-wide. This bypasses the original strict or namespace-wide constraints, allowing the attacker to retarget and unseal the secret in any namespace or under any name, thereby recovering plaintext credentials. The vulnerability requires high privileges (authenticated user) but no user interaction. The CVSS v3.1 base score is 4.9 (medium), reflecting network attack vector, low attack complexity, required privileges, and high confidentiality impact without integrity or availability impact. No patches have been published yet, and no known exploits are reported in the wild. This flaw highlights the risk of trusting unvalidated metadata in Kubernetes controllers managing sensitive data.
Potential Impact
The primary impact of CVE-2026-22728 is unauthorized disclosure of sensitive secrets stored in Kubernetes clusters using Bitnami Sealed Secrets 0.35.0. By exploiting this vulnerability, an attacker with authenticated access to the secret rotation endpoint can escalate the scope of secrets from namespace-limited to cluster-wide. This allows the attacker to decrypt secrets across namespaces, potentially exposing credentials, API keys, or other sensitive configuration data. Such exposure can lead to lateral movement within the cluster, privilege escalation, and compromise of critical workloads. Organizations relying on sealed-secrets for secure secret management face increased risk of data breaches and operational disruption. Although exploitation requires authenticated access, the widespread use of Kubernetes and Bitnami Sealed Secrets in cloud-native environments means many organizations globally could be affected. The vulnerability undermines the confidentiality guarantees of sealed-secrets, impacting trust in secret management workflows.
Mitigation Recommendations
To mitigate CVE-2026-22728, organizations should: 1) Restrict access to the /v1/rotate endpoint to only highly trusted and authenticated users or service accounts, minimizing the attack surface. 2) Implement strict RBAC policies in Kubernetes to limit who can invoke secret rotation operations. 3) Monitor and audit usage of the rotate endpoint and SealedSecret annotations for suspicious or unauthorized modifications, especially the sealedsecrets.bitnami.com/cluster-wide annotation. 4) Avoid using version 0.35.0 of Bitnami Sealed Secrets until an official patch is released; upgrade to a fixed version once available. 5) Consider additional encryption or access controls external to sealed-secrets for highly sensitive secrets. 6) Review and validate all input metadata in secret rotation workflows to prevent injection of unauthorized annotations. 7) Employ network segmentation and zero-trust principles to limit exposure of Kubernetes API endpoints. These targeted measures go beyond generic advice by focusing on controlling access to the vulnerable rotation functionality and monitoring for exploitation attempts.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, India, Brazil
CVE-2026-22728: CWE-284 in Bitnami sealed-secrets
Description
CVE-2026-22728 is a medium severity vulnerability in Bitnami Sealed Secrets version 0. 35. 0 that allows a scope-widening attack during the secret rotation process. An attacker with high privileges can manipulate the annotations in a SealedSecret to escalate the scope of the rotated secret to cluster-wide, bypassing namespace restrictions. This enables the attacker to unseal secrets in any namespace or under any name, potentially exposing plaintext credentials. The vulnerability stems from improper authorization checks (CWE-284) in the rotation handler that trusts unvalidated input annotations. Exploitation requires authenticated access and no user interaction is needed. There are no known exploits in the wild, and no patches have been linked yet. Organizations using Bitnami Sealed Secrets 0. 35.
AI-Powered Analysis
Technical Analysis
Bitnami Sealed Secrets is a Kubernetes controller that encrypts secrets so they can be safely stored in version control. In version 0.35.0, the secret rotation endpoint (/v1/rotate) contains a vulnerability (CVE-2026-22728) classified under CWE-284 (Improper Access Control). During secret rotation, the handler derives the sealing scope for the new encrypted secret from the annotations in the input SealedSecret's template metadata. However, these annotations are untrusted user input and can be manipulated. By injecting the annotation sealedsecrets.bitnami.com/cluster-wide=true, an attacker with authenticated access to the rotate endpoint can escalate the scope of the rotated secret from namespace-restricted to cluster-wide. This bypasses the original strict or namespace-wide constraints, allowing the attacker to retarget and unseal the secret in any namespace or under any name, thereby recovering plaintext credentials. The vulnerability requires high privileges (authenticated user) but no user interaction. The CVSS v3.1 base score is 4.9 (medium), reflecting network attack vector, low attack complexity, required privileges, and high confidentiality impact without integrity or availability impact. No patches have been published yet, and no known exploits are reported in the wild. This flaw highlights the risk of trusting unvalidated metadata in Kubernetes controllers managing sensitive data.
Potential Impact
The primary impact of CVE-2026-22728 is unauthorized disclosure of sensitive secrets stored in Kubernetes clusters using Bitnami Sealed Secrets 0.35.0. By exploiting this vulnerability, an attacker with authenticated access to the secret rotation endpoint can escalate the scope of secrets from namespace-limited to cluster-wide. This allows the attacker to decrypt secrets across namespaces, potentially exposing credentials, API keys, or other sensitive configuration data. Such exposure can lead to lateral movement within the cluster, privilege escalation, and compromise of critical workloads. Organizations relying on sealed-secrets for secure secret management face increased risk of data breaches and operational disruption. Although exploitation requires authenticated access, the widespread use of Kubernetes and Bitnami Sealed Secrets in cloud-native environments means many organizations globally could be affected. The vulnerability undermines the confidentiality guarantees of sealed-secrets, impacting trust in secret management workflows.
Mitigation Recommendations
To mitigate CVE-2026-22728, organizations should: 1) Restrict access to the /v1/rotate endpoint to only highly trusted and authenticated users or service accounts, minimizing the attack surface. 2) Implement strict RBAC policies in Kubernetes to limit who can invoke secret rotation operations. 3) Monitor and audit usage of the rotate endpoint and SealedSecret annotations for suspicious or unauthorized modifications, especially the sealedsecrets.bitnami.com/cluster-wide annotation. 4) Avoid using version 0.35.0 of Bitnami Sealed Secrets until an official patch is released; upgrade to a fixed version once available. 5) Consider additional encryption or access controls external to sealed-secrets for highly sensitive secrets. 6) Review and validate all input metadata in secret rotation workflows to prevent injection of unauthorized annotations. 7) Employ network segmentation and zero-trust principles to limit exposure of Kubernetes API endpoints. These targeted measures go beyond generic advice by focusing on controlling access to the vulnerable rotation functionality and monitoring for exploitation attempts.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- vmware
- Date Reserved
- 2026-01-09T06:54:41.497Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699fa148b7ef31ef0b77969a
Added to database: 2/26/2026, 1:26:32 AM
Last enriched: 2/26/2026, 1:43:35 AM
Last updated: 2/26/2026, 11:30:02 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.