Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27112: CWE-863: Incorrect Authorization in akuity kargo

0
Critical
VulnerabilityCVE-2026-27112cvecve-2026-27112cwe-863
Published: Fri Feb 20 2026 (02/20/2026, 21:22:56 UTC)
Source: CVE Database V5
Vendor/Project: akuity
Product: kargo

Description

Kargo manages and automates the promotion of software artifacts. From 1.7.0 to before v1.7.8, v1.8.11, and v1.9.3, the batch resource creation endpoints of both Kargo's legacy gRPC API and newer REST API accept multi-document YAML payloads. Specially crafted payloads can manifest a bug present in the logic of both endpoints to inject arbitrary resources (of specific types only) into the underlying namespace of an existing Project using the API server's own permissions when that behavior was not intended. Critically, an attacker may exploit this as a vector for elevating their own permissions, which can then be leveraged to achieve remote code execution or secret exfiltration. Exfiltrated artifact repository credentials can be leveraged, in turn, to execute further attacks. In some configurations of the Kargo control plane's underlying Kubernetes cluster, elevated permissions may additionally be leveraged to achieve remote code execution or secret exfiltration using kubectl. This can reduce the complexity of the attack, however, worst case scenarios remain entirely achievable even without this. This vulnerability is fixed in v1.7.8, v1.8.11, and v1.9.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 12:37:08 UTC

Technical Analysis

CVE-2026-27112 is an incorrect authorization vulnerability (CWE-863) found in akuity kargo, a tool that manages and automates software artifact promotion. The flaw exists in the batch resource creation endpoints of both the legacy gRPC API and the newer REST API, which accept multi-document YAML payloads. Due to a logic bug in these endpoints, specially crafted payloads can inject arbitrary resources of specific types into the namespace of an existing Project without proper authorization checks. This injection occurs with the API server's own permissions, which are typically elevated, allowing attackers to escalate their privileges beyond intended limits. Exploiting this vulnerability does not require user interaction or prior authentication but does require some level of privileges (PR:L). Once escalated, attackers can achieve remote code execution or exfiltrate secrets such as artifact repository credentials. These credentials can then be used to conduct further attacks within the environment. In Kubernetes clusters underlying the kargo control plane, certain configurations allow attackers to leverage kubectl with elevated permissions to simplify remote code execution or secret theft, although the worst-case scenarios remain achievable without this. The vulnerability affects versions from 1.7.0 up to but not including 1.7.8, 1.8.11, and 1.9.3, where it has been patched. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no user interaction, and high impacts on confidentiality, integrity, and availability, confirming the critical nature of this vulnerability.

Potential Impact

The impact of CVE-2026-27112 is severe for organizations using affected versions of akuity kargo. Successful exploitation allows attackers to bypass authorization controls and inject arbitrary resources into project namespaces, effectively escalating their privileges. This can lead to remote code execution within the Kubernetes environment, compromising the integrity and availability of critical infrastructure. Secret exfiltration, including artifact repository credentials, can facilitate lateral movement and further compromise of software supply chains. Organizations relying on kargo for artifact promotion risk supply chain attacks, data breaches, and operational disruption. The ability to exploit this vulnerability remotely and without user interaction increases the attack surface and likelihood of exploitation. In Kubernetes clusters with permissive configurations, attackers can leverage kubectl to simplify exploitation, exacerbating the risk. Overall, this vulnerability threatens confidentiality, integrity, and availability of software delivery pipelines and underlying infrastructure, potentially impacting development, deployment, and production environments globally.

Mitigation Recommendations

To mitigate CVE-2026-27112, organizations should immediately upgrade akuity kargo to versions 1.7.8, 1.8.11, or 1.9.3 or later, where the vulnerability is patched. Until upgrades are applied, restrict access to kargo APIs by implementing strict network segmentation and firewall rules to limit exposure to trusted users and systems only. Employ Kubernetes Role-Based Access Control (RBAC) policies to minimize permissions granted to kargo components and users, ensuring least privilege principles are enforced. Monitor API usage logs for anomalous multi-document YAML payloads or unusual resource creation patterns indicative of exploitation attempts. Rotate and audit artifact repository credentials regularly to reduce the impact of potential exfiltration. Additionally, review and harden Kubernetes cluster configurations, especially controlling kubectl access and ensuring that service accounts used by kargo have minimal privileges. Implement runtime security monitoring and intrusion detection to detect suspicious activities related to resource injection or privilege escalation. Finally, conduct security awareness training for DevOps and security teams to recognize and respond to exploitation attempts targeting software supply chain tools.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T18:42:27.042Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6998d2dfbe58cf853bb9b974

Added to database: 2/20/2026, 9:32:15 PM

Last enriched: 2/28/2026, 12:37:08 PM

Last updated: 4/7/2026, 1:35:05 PM

Views: 181

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses