Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27111: CWE-862: Missing Authorization in akuity kargo

0
Medium
VulnerabilityCVE-2026-27111cvecve-2026-27111cwe-862
Published: Fri Feb 20 2026 (02/20/2026, 21:17:07 UTC)
Source: CVE Database V5
Vendor/Project: akuity
Product: kargo

Description

Kargo manages and automates the promotion of software artifacts. From v1.9.0 to v1.9.2, Kargo's authorization model includes a promote verb -- a non-standard Kubernetes "dolphin verb" -- that gates the ability to advance Freight through a promotion pipeline. This verb exists to separate the ability to manage promotion-related resources from the ability to trigger promotions, enabling fine-grained access control over what is often a sensitive operation. The promote verb is correctly enforced in Kargo's legacy gRPC API. However, three endpoints in the newer REST API omit this check, relying only on standard Kubernetes RBAC for the underlying resource operations (patch on freights/status or create on promotions). This permits users who hold those standard permissions -- but who were deliberately not granted promote -- to bypass the intended authorization boundary. The affected endpoints are /v1beta1/projects/{project}/freight/{freight}/approve, /v1beta1/projects/{project}/stages/{stage}/promotions, and /v1beta1/projects/{project}/stages/{stage}/promotions/downstream. This vulnerability is fixed in v1.9.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:36:47 UTC

Technical Analysis

Akuity kargo is a tool that manages and automates the promotion of software artifacts through defined pipelines. From versions 1.9.0 to 1.9.2, kargo implements a custom authorization model that includes a non-standard Kubernetes verb called 'promote'. This verb is designed to separate the ability to manage promotion-related resources from the ability to trigger promotions, enabling fine-grained access control over sensitive promotion operations. While the legacy gRPC API correctly enforces the 'promote' verb authorization, three REST API endpoints—/v1beta1/projects/{project}/freight/{freight}/approve, /v1beta1/projects/{project}/stages/{stage}/promotions, and /v1beta1/projects/{project}/stages/{stage}/promotions/downstream—fail to enforce this check. Instead, they rely solely on standard Kubernetes RBAC permissions such as patch on freights/status or create on promotions. This omission allows users who have these standard permissions but were not granted the 'promote' verb to bypass the intended authorization boundary and advance software artifacts through the promotion pipeline without proper authorization. This vulnerability is classified under CWE-862 (Missing Authorization) and has a CVSS 4.0 base score of 5.3, indicating medium severity. The vulnerability does not require user interaction and can be exploited remotely with low privileges. The issue is resolved in kargo version 1.9.3, where the REST API endpoints properly enforce the 'promote' verb authorization. No known exploits have been reported in the wild as of the publication date.

Potential Impact

This vulnerability allows unauthorized users with limited Kubernetes RBAC permissions to bypass critical authorization controls and promote software artifacts through kargo's promotion pipeline. The impact includes potential compromise of software release integrity, as unauthorized promotions could introduce unvetted or malicious artifacts into production or downstream environments. This undermines the trustworthiness of the software delivery process and could lead to deployment of vulnerable or malicious code. Organizations relying on kargo for artifact promotion risk unauthorized changes to their release pipelines, which could result in operational disruptions, compliance violations, and increased attack surface. Since the promotion process is often a sensitive operation in CI/CD workflows, this flaw could be leveraged by insiders or attackers with limited access to escalate their privileges within the software delivery lifecycle. The medium CVSS score reflects the moderate impact and ease of exploitation without user interaction, but limited scope due to required Kubernetes permissions. However, the potential for supply chain compromise elevates the risk for organizations with critical software delivery pipelines using affected kargo versions.

Mitigation Recommendations

Organizations should upgrade akuity kargo to version 1.9.3 or later, where the REST API endpoints correctly enforce the 'promote' verb authorization. Until upgrading, administrators should audit and tighten Kubernetes RBAC permissions to ensure that users without explicit 'promote' verb rights do not have patch or create permissions on freights/status or promotions resources. Implement strict role separation and least privilege principles around promotion-related resources. Monitor API access logs for suspicious promotion-related activities, especially calls to the affected REST endpoints. Consider implementing additional external authorization or admission controls to enforce promotion policies. Regularly review and update CI/CD pipeline security configurations to detect unauthorized promotion attempts. Engage in security testing of the promotion workflows to identify any other potential authorization gaps. Finally, maintain awareness of vendor advisories and apply patches promptly to reduce exposure.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.042Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998d2dfbe58cf853bb9b970

Added to database: 2/20/2026, 9:32:15 PM

Last enriched: 2/28/2026, 12:36:47 PM

Last updated: 4/7/2026, 6:49:37 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses