Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25538: CWE-862: Missing Authorization in devtron-labs devtron

0
High
VulnerabilityCVE-2026-25538cvecve-2026-25538cwe-862
Published: Wed Feb 04 2026 (02/04/2026, 21:37:04 UTC)
Source: CVE Database V5
Vendor/Project: devtron-labs
Product: devtron

Description

CVE-2026-25538 is a high-severity vulnerability in Devtron versions 2. 0. 0 and earlier, where an authorization bypass in the Attributes API allows any authenticated user, including low-privileged CI/CD developers, to retrieve the global API token signing key. With this key, attackers can forge JWT tokens for any user identity, gaining full control over the Devtron platform and enabling lateral movement into the underlying Kubernetes cluster. The vulnerability requires no user interaction and can be exploited remotely with low complexity. This flaw has been patched in later versions. European organizations using Devtron for Kubernetes integration are at risk of severe confidentiality, integrity, and availability impacts if unpatched. Mitigation involves immediate upgrading to patched versions and restricting access to the Attributes API endpoint. Countries with significant Kubernetes adoption and Devtron usage, such as Germany, the UK, France, and the Netherlands, are most likely affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:29:49 UTC

Technical Analysis

CVE-2026-25538 is a critical authorization vulnerability (CWE-862) found in Devtron, an open-source Kubernetes tool integration platform, affecting versions 2.0.0 and prior. The flaw resides in the Attributes API interface, specifically the /orchestrator/attributes?key=apiTokenSecret endpoint, which improperly authorizes access to sensitive data. Any authenticated user, including those with minimal privileges such as CI/CD developers, can exploit this endpoint to retrieve the global API token signing key. Possession of this key enables attackers to forge JSON Web Tokens (JWTs) offline for arbitrary user identities, effectively bypassing authentication and authorization controls within Devtron. This leads to complete platform compromise, allowing attackers to execute arbitrary actions and move laterally into the underlying Kubernetes cluster, potentially compromising cluster-wide resources and workloads. The vulnerability is remotely exploitable without user interaction and requires only low privileges, increasing its risk profile. Although no known exploits are reported in the wild, the high CVSS 4.0 score of 8.7 reflects the severe impact and ease of exploitation. The issue has been addressed in a patch committed under d2b0d26, and users are strongly advised to upgrade. The vulnerability highlights the critical need for strict authorization checks on sensitive API endpoints, especially in platforms managing Kubernetes environments.

Potential Impact

For European organizations, the impact of CVE-2026-25538 is significant due to the widespread adoption of Kubernetes and DevOps practices involving CI/CD pipelines. Compromise of the Devtron platform can lead to unauthorized access to sensitive workloads, data leakage, and disruption of critical services. Attackers gaining control over Devtron can manipulate deployment pipelines, inject malicious code, or disrupt application availability, severely affecting business continuity. The lateral movement into Kubernetes clusters can escalate the attack to compromise entire cloud-native infrastructures, affecting confidentiality, integrity, and availability of enterprise applications. This is particularly critical for sectors such as finance, healthcare, and critical infrastructure in Europe, where data protection and service reliability are paramount. The vulnerability's ease of exploitation by low-privileged users increases insider threat risks and the potential for supply chain attacks through compromised CI/CD processes.

Mitigation Recommendations

1. Immediately upgrade Devtron installations to versions later than 2.0.0 where the vulnerability is patched. 2. Restrict access to the /orchestrator/attributes API endpoint to only highly trusted and necessary users or service accounts. 3. Implement strict role-based access controls (RBAC) within Devtron and Kubernetes to minimize privileges of CI/CD developers and other users. 4. Monitor API access logs for suspicious requests to the Attributes API, especially attempts to access apiTokenSecret keys. 5. Rotate API token signing keys after patching to invalidate any potentially compromised tokens. 6. Employ network segmentation and zero-trust principles to limit lateral movement opportunities within Kubernetes clusters. 7. Conduct regular security audits and penetration testing focused on authorization controls in DevOps tools. 8. Educate development and operations teams about the risks of excessive privileges and the importance of secure CI/CD practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.374Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983bde5f9fa50a62fae8c98

Added to database: 2/4/2026, 9:45:09 PM

Last enriched: 2/12/2026, 7:29:49 AM

Last updated: 3/22/2026, 6:04:56 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses