Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27112: CWE-863: Incorrect Authorization in akuity kargo

0
Critical
VulnerabilityCVE-2026-27112cvecve-2026-27112cwe-863
Published: Fri Feb 20 2026 (02/20/2026, 21:22:56 UTC)
Source: CVE Database V5
Vendor/Project: akuity
Product: kargo

Description

Kargo manages and automates the promotion of software artifacts. From 1.7.0 to before v1.7.8, v1.8.11, and v1.9.3, the batch resource creation endpoints of both Kargo's legacy gRPC API and newer REST API accept multi-document YAML payloads. Specially crafted payloads can manifest a bug present in the logic of both endpoints to inject arbitrary resources (of specific types only) into the underlying namespace of an existing Project using the API server's own permissions when that behavior was not intended. Critically, an attacker may exploit this as a vector for elevating their own permissions, which can then be leveraged to achieve remote code execution or secret exfiltration. Exfiltrated artifact repository credentials can be leveraged, in turn, to execute further attacks. In some configurations of the Kargo control plane's underlying Kubernetes cluster, elevated permissions may additionally be leveraged to achieve remote code execution or secret exfiltration using kubectl. This can reduce the complexity of the attack, however, worst case scenarios remain entirely achievable even without this. This vulnerability is fixed in v1.7.8, v1.8.11, and v1.9.3.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:46:30 UTC

Technical Analysis

CVE-2026-27112 is an incorrect authorization vulnerability (CWE-863) affecting akuity kargo, a software artifact promotion and automation tool. The flaw exists in the batch resource creation endpoints of both the legacy gRPC API and the newer REST API, which accept multi-document YAML payloads. Due to improper authorization checks, specially crafted payloads can inject arbitrary resources of specific types into the namespace of an existing Project. This injection occurs with the API server's permissions, which are typically elevated, allowing attackers to escalate their privileges beyond intended limits. Exploiting this vulnerability enables attackers to perform remote code execution or exfiltrate sensitive secrets such as artifact repository credentials. These credentials can then be used to conduct further attacks within the environment. Additionally, in some Kubernetes cluster configurations underlying the Kargo control plane, attackers with elevated permissions can leverage kubectl to simplify achieving remote code execution or secret exfiltration. The vulnerability affects versions from 1.7.0 up to but not including 1.7.8, 1.8.11, and 1.9.3, where it has been patched. The CVSS 4.0 score of 9.4 indicates a critical severity, with network attack vector, low attack complexity, no privileges required initially but some privileges needed for exploitation, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits are known at this time, but the potential for severe impact is significant given the elevated permissions and possible remote code execution.

Potential Impact

The vulnerability poses a critical risk to organizations using affected versions of akuity kargo, especially those managing sensitive software artifact repositories and Kubernetes clusters. Exploitation can lead to unauthorized privilege escalation, enabling attackers to execute arbitrary code remotely and exfiltrate secrets such as repository credentials. This can compromise the integrity of software supply chains, leading to the distribution of malicious artifacts or unauthorized access to internal systems. The ability to leverage kubectl in certain Kubernetes configurations further amplifies the risk by simplifying lateral movement and control over cluster resources. Organizations may face severe operational disruptions, data breaches, and potential compliance violations. The widespread use of Kubernetes and artifact management tools in cloud-native environments increases the scope and potential impact of this vulnerability globally.

Mitigation Recommendations

Organizations should immediately upgrade akuity kargo to versions 1.7.8, 1.8.11, or 1.9.3 or later to apply the official patches. Until upgrades are possible, restrict access to the batch resource creation endpoints by implementing strict network segmentation and API access controls. Employ Kubernetes Role-Based Access Control (RBAC) policies to minimize permissions granted to the API server and service accounts, limiting the potential impact of privilege escalation. Monitor API server logs and Kubernetes audit logs for unusual multi-document YAML payload submissions or unauthorized resource creations. Use runtime security tools to detect anomalous behavior indicative of exploitation attempts. Regularly rotate artifact repository credentials and secrets to reduce the window of opportunity for attackers. Conduct thorough security reviews of Kubernetes cluster configurations to ensure that kubectl and other administrative tools are not exposed unnecessarily. Finally, integrate vulnerability scanning and continuous monitoring into the software supply chain to detect and respond to similar threats proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.042Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998d2dfbe58cf853bb9b974

Added to database: 2/20/2026, 9:32:15 PM

Last enriched: 2/20/2026, 9:46:30 PM

Last updated: 2/21/2026, 12:00:13 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats