Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25538: CWE-862: Missing Authorization in devtron-labs devtron

0
High
VulnerabilityCVE-2026-25538cvecve-2026-25538cwe-862
Published: Wed Feb 04 2026 (02/04/2026, 21:37:04 UTC)
Source: CVE Database V5
Vendor/Project: devtron-labs
Product: devtron

Description

CVE-2026-25538 is a high-severity vulnerability in Devtron versions 2. 0. 0 and earlier, where an authenticated user with low privileges can access the global API token signing key via the Attributes API. This key exposure allows attackers to forge JWT tokens for any user identity, gaining full control over the Devtron platform and enabling lateral movement within the Kubernetes cluster. The vulnerability arises from missing authorization checks on the /orchestrator/attributes? key=apiTokenSecret endpoint. No user interaction or elevated privileges beyond authentication are required, and the flaw has been patched in later versions. European organizations using Devtron for Kubernetes management are at risk of severe compromise if unpatched. Mitigation involves immediate upgrade to patched versions and restricting access to the Attributes API endpoint. Countries with significant Kubernetes adoption and Devtron usage, such as Germany, the UK, France, and the Netherlands, are most likely affected.

AI-Powered Analysis

AILast updated: 02/04/2026, 21:59:31 UTC

Technical Analysis

CVE-2026-25538 is a critical authorization bypass vulnerability classified under CWE-862, affecting Devtron, an open-source Kubernetes tool integration platform. In versions 2.0.0 and prior, the Attributes API interface lacks proper authorization controls on the endpoint /orchestrator/attributes?key=apiTokenSecret. This flaw allows any authenticated user, including those with minimal CI/CD developer privileges, to retrieve the global API token signing key. Possession of this key enables offline forging of JSON Web Tokens (JWTs) for arbitrary user identities, effectively granting attackers unrestricted access to the Devtron platform. With full platform control, attackers can execute lateral movement attacks within the underlying Kubernetes cluster, potentially compromising cluster-wide resources and workloads. The vulnerability requires no user interaction and no elevated privileges beyond authentication, making exploitation straightforward in environments where Devtron is deployed. The issue was addressed and patched in a subsequent commit (d2b0d26). The CVSS 4.0 score of 8.7 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. Although no known exploits are currently reported in the wild, the severity and ease of exploitation warrant immediate attention from Devtron users.

Potential Impact

For European organizations, this vulnerability poses a significant risk to Kubernetes infrastructure security. Devtron is used to streamline and manage Kubernetes deployments, so compromise of its platform can lead to full cluster takeover, exposing sensitive applications and data. Attackers gaining control can manipulate workloads, exfiltrate data, disrupt services, or deploy malicious containers. The ability to forge JWT tokens offline means attackers can maintain persistent access without detection. This threat is particularly critical for organizations relying heavily on Kubernetes for production workloads, including financial institutions, healthcare providers, and critical infrastructure operators across Europe. The lateral movement capability increases the attack surface beyond the initial compromise, potentially affecting multiple teams and services. Unpatched systems could lead to severe operational disruptions, data breaches, and regulatory non-compliance under GDPR and other European data protection laws.

Mitigation Recommendations

Organizations should immediately upgrade Devtron to versions later than 2.0.0 where the vulnerability is patched. Until upgrades are applied, restrict access to the /orchestrator/attributes API endpoint to only trusted and highly privileged users through network segmentation and API gateway policies. Implement strict authentication and authorization controls around Devtron’s APIs, employing role-based access control (RBAC) to limit user privileges. Monitor API access logs for unusual requests to the attributes endpoint, especially attempts to access the apiTokenSecret key. Employ runtime security tools to detect anomalous JWT token creation or usage patterns. Conduct regular security audits of Kubernetes management platforms and ensure secrets management follows best practices, including key rotation and minimal exposure. Educate CI/CD developers about the risks of privilege escalation and enforce the principle of least privilege. Finally, integrate Devtron patch management into the organization’s vulnerability management lifecycle to ensure timely updates.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T19:59:47.374Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983bde5f9fa50a62fae8c98

Added to database: 2/4/2026, 9:45:09 PM

Last enriched: 2/4/2026, 9:59:31 PM

Last updated: 2/5/2026, 2:02:03 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats