CVE-2026-27111: CWE-862: Missing Authorization in akuity kargo
Kargo manages and automates the promotion of software artifacts. From v1.9.0 to v1.9.2, Kargo's authorization model includes a promote verb -- a non-standard Kubernetes "dolphin verb" -- that gates the ability to advance Freight through a promotion pipeline. This verb exists to separate the ability to manage promotion-related resources from the ability to trigger promotions, enabling fine-grained access control over what is often a sensitive operation. The promote verb is correctly enforced in Kargo's legacy gRPC API. However, three endpoints in the newer REST API omit this check, relying only on standard Kubernetes RBAC for the underlying resource operations (patch on freights/status or create on promotions). This permits users who hold those standard permissions -- but who were deliberately not granted promote -- to bypass the intended authorization boundary. The affected endpoints are /v1beta1/projects/{project}/freight/{freight}/approve, /v1beta1/projects/{project}/stages/{stage}/promotions, and /v1beta1/projects/{project}/stages/{stage}/promotions/downstream. This vulnerability is fixed in v1.9.3.
AI Analysis
Technical Summary
Akuity Kargo is a tool that manages and automates software artifact promotion pipelines. From versions 1.9.0 through 1.9.2, Kargo implements a custom authorization model that includes a non-standard Kubernetes verb called 'promote'. This verb is designed to separate the ability to manage promotion-related resources from the ability to actually trigger promotions, enabling fine-grained access control over a sensitive operation. While the legacy gRPC API correctly enforces this promote verb, three endpoints in the newer REST API do not enforce it. Instead, these endpoints rely solely on standard Kubernetes RBAC permissions for patching freight status or creating promotions. The endpoints affected are /v1beta1/projects/{project}/freight/{freight}/approve, /v1beta1/projects/{project}/stages/{stage}/promotions, and /v1beta1/projects/{project}/stages/{stage}/promotions/downstream. Because these endpoints omit the promote verb check, users who have standard permissions to patch or create but were deliberately not granted promote permissions can bypass the intended authorization boundary and trigger promotions they should not be authorized to perform. This represents a missing authorization vulnerability classified as CWE-862. The vulnerability was assigned CVE-2026-27111 and has a CVSS 4.0 base score of 5.3 (medium severity). The vulnerability was publicly disclosed on February 20, 2026, and fixed in Kargo version 1.9.3.
Potential Impact
This vulnerability allows unauthorized users who have limited Kubernetes RBAC permissions to bypass intended access controls and trigger software artifact promotions. Since promotion pipelines often gate the release of software to production or downstream environments, unauthorized promotion can lead to premature or unapproved deployment of software artifacts. This can result in the introduction of unvetted code, potential service disruptions, or the deployment of malicious or unstable software. Organizations relying on Kargo for their CI/CD or release automation pipelines may face integrity risks to their software supply chain. The impact is primarily on integrity and potentially availability if improper promotions cause failures. Confidentiality impact is minimal. Because exploitation requires some level of privileges (patch or create on certain resources), the risk is limited to users with those permissions, but the bypass of the promote verb reduces the granularity of access control and increases the attack surface. No user interaction is required, and the vulnerability is remotely exploitable over the network. No known exploits are reported in the wild yet, but the vulnerability could be leveraged by insiders or compromised accounts to escalate promotion privileges.
Mitigation Recommendations
Upgrade Akuity Kargo to version 1.9.3 or later, where the missing authorization checks on the REST API endpoints are fixed. Until upgrade is possible, organizations should audit and restrict Kubernetes RBAC permissions carefully, ensuring that only fully trusted users have patch or create permissions on freight status and promotion resources. Implement monitoring and alerting on promotion-related API calls to detect unauthorized promotion attempts. Consider isolating promotion operations to dedicated service accounts with minimal privileges. Review and tighten access control policies around promotion pipelines and artifact management. Conduct regular security reviews of CI/CD pipeline permissions and logs. If feasible, disable or restrict access to the affected REST API endpoints until patched. Employ network segmentation and zero trust principles to limit exposure of Kargo management interfaces. Finally, educate developers and operators about the importance of the promote verb and the risks of bypassing it.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Japan, Netherlands, France, India, South Korea
CVE-2026-27111: CWE-862: Missing Authorization in akuity kargo
Description
Kargo manages and automates the promotion of software artifacts. From v1.9.0 to v1.9.2, Kargo's authorization model includes a promote verb -- a non-standard Kubernetes "dolphin verb" -- that gates the ability to advance Freight through a promotion pipeline. This verb exists to separate the ability to manage promotion-related resources from the ability to trigger promotions, enabling fine-grained access control over what is often a sensitive operation. The promote verb is correctly enforced in Kargo's legacy gRPC API. However, three endpoints in the newer REST API omit this check, relying only on standard Kubernetes RBAC for the underlying resource operations (patch on freights/status or create on promotions). This permits users who hold those standard permissions -- but who were deliberately not granted promote -- to bypass the intended authorization boundary. The affected endpoints are /v1beta1/projects/{project}/freight/{freight}/approve, /v1beta1/projects/{project}/stages/{stage}/promotions, and /v1beta1/projects/{project}/stages/{stage}/promotions/downstream. This vulnerability is fixed in v1.9.3.
AI-Powered Analysis
Technical Analysis
Akuity Kargo is a tool that manages and automates software artifact promotion pipelines. From versions 1.9.0 through 1.9.2, Kargo implements a custom authorization model that includes a non-standard Kubernetes verb called 'promote'. This verb is designed to separate the ability to manage promotion-related resources from the ability to actually trigger promotions, enabling fine-grained access control over a sensitive operation. While the legacy gRPC API correctly enforces this promote verb, three endpoints in the newer REST API do not enforce it. Instead, these endpoints rely solely on standard Kubernetes RBAC permissions for patching freight status or creating promotions. The endpoints affected are /v1beta1/projects/{project}/freight/{freight}/approve, /v1beta1/projects/{project}/stages/{stage}/promotions, and /v1beta1/projects/{project}/stages/{stage}/promotions/downstream. Because these endpoints omit the promote verb check, users who have standard permissions to patch or create but were deliberately not granted promote permissions can bypass the intended authorization boundary and trigger promotions they should not be authorized to perform. This represents a missing authorization vulnerability classified as CWE-862. The vulnerability was assigned CVE-2026-27111 and has a CVSS 4.0 base score of 5.3 (medium severity). The vulnerability was publicly disclosed on February 20, 2026, and fixed in Kargo version 1.9.3.
Potential Impact
This vulnerability allows unauthorized users who have limited Kubernetes RBAC permissions to bypass intended access controls and trigger software artifact promotions. Since promotion pipelines often gate the release of software to production or downstream environments, unauthorized promotion can lead to premature or unapproved deployment of software artifacts. This can result in the introduction of unvetted code, potential service disruptions, or the deployment of malicious or unstable software. Organizations relying on Kargo for their CI/CD or release automation pipelines may face integrity risks to their software supply chain. The impact is primarily on integrity and potentially availability if improper promotions cause failures. Confidentiality impact is minimal. Because exploitation requires some level of privileges (patch or create on certain resources), the risk is limited to users with those permissions, but the bypass of the promote verb reduces the granularity of access control and increases the attack surface. No user interaction is required, and the vulnerability is remotely exploitable over the network. No known exploits are reported in the wild yet, but the vulnerability could be leveraged by insiders or compromised accounts to escalate promotion privileges.
Mitigation Recommendations
Upgrade Akuity Kargo to version 1.9.3 or later, where the missing authorization checks on the REST API endpoints are fixed. Until upgrade is possible, organizations should audit and restrict Kubernetes RBAC permissions carefully, ensuring that only fully trusted users have patch or create permissions on freight status and promotion resources. Implement monitoring and alerting on promotion-related API calls to detect unauthorized promotion attempts. Consider isolating promotion operations to dedicated service accounts with minimal privileges. Review and tighten access control policies around promotion pipelines and artifact management. Conduct regular security reviews of CI/CD pipeline permissions and logs. If feasible, disable or restrict access to the affected REST API endpoints until patched. Employ network segmentation and zero trust principles to limit exposure of Kargo management interfaces. Finally, educate developers and operators about the importance of the promote verb and the risks of bypassing it.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-17T18:42:27.042Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6998d2dfbe58cf853bb9b970
Added to database: 2/20/2026, 9:32:15 PM
Last enriched: 2/20/2026, 9:47:14 PM
Last updated: 2/21/2026, 12:17:50 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.