Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2808: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Consul

0
Medium
VulnerabilityCVE-2026-2808cvecve-2026-2808cwe-59
Published: Wed Mar 11 2026 (03/11/2026, 23:08:32 UTC)
Source: CVE Database V5
Vendor/Project: HashiCorp
Product: Consul

Description

CVE-2026-2808 is a medium-severity vulnerability in HashiCorp Consul versions 1. 18. 20 up to 1. 21. 10 and 1. 22. 4 that allows arbitrary file read due to improper link resolution before file access (CWE-59). The flaw occurs when Consul is configured with Kubernetes authentication, enabling an attacker with high privileges to read sensitive files without user interaction. This vulnerability affects confidentiality but not integrity or availability. It requires network access and high privileges, and it has a CVSS score of 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/19/2026, 02:32:55 UTC

Technical Analysis

CVE-2026-2808 is a vulnerability in HashiCorp Consul and Consul Enterprise versions 1.18.20 through 1.21.10 and 1.22.4 that arises from improper link resolution before file access, classified under CWE-59. This flaw allows an attacker to perform arbitrary file reads when Consul is configured to use Kubernetes authentication. The vulnerability stems from the software following symbolic links insecurely, enabling access to files outside intended directories. Exploitation requires the attacker to have high-level privileges (PR:H) and network access (AV:N), but no user interaction is needed (UI:N). The vulnerability impacts confidentiality by exposing potentially sensitive files, but does not affect integrity or availability. The scope is changed (S:C) because the vulnerability can affect resources beyond the initially intended scope. HashiCorp addressed this issue in subsequent patch releases: 1.18.21, 1.21.11, and 1.22.5. No known exploits are currently reported in the wild, but the presence of this vulnerability in widely used versions of Consul, especially in Kubernetes environments, makes it a significant concern for organizations relying on these configurations.

Potential Impact

The primary impact of CVE-2026-2808 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers with high privileges on the network can exploit this vulnerability to access configuration files, credentials, or other sensitive data stored on the Consul server, potentially leading to further compromise of the environment. Since Consul is often used for service discovery and configuration in cloud-native and Kubernetes environments, exposure of such data can undermine the security of entire microservices architectures. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach can facilitate lateral movement, privilege escalation, or data exfiltration. Organizations with large-scale Kubernetes deployments and those using Consul for critical infrastructure services are at heightened risk, as attackers could leverage this vulnerability to gain insights into internal network configurations and secrets.

Mitigation Recommendations

To mitigate CVE-2026-2808, organizations should immediately upgrade affected Consul versions to the patched releases: 1.18.21, 1.21.11, or 1.22.5. In addition to patching, administrators should audit and restrict Kubernetes authentication configurations to minimize exposure. Implement strict access controls and network segmentation to limit which users and services have high-level privileges capable of exploiting this vulnerability. Employ runtime security monitoring to detect unusual file access patterns or symbolic link traversals within Consul processes. Regularly review Consul server logs for suspicious activity and enforce the principle of least privilege for all Consul and Kubernetes service accounts. Finally, consider using file integrity monitoring solutions to detect unauthorized file reads or modifications in sensitive directories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
HashiCorp
Date Reserved
2026-02-19T15:17:24.550Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1faec2f860ef94395a3ac

Added to database: 3/11/2026, 11:29:48 PM

Last enriched: 3/19/2026, 2:32:55 AM

Last updated: 4/11/2026, 2:34:00 PM

Views: 118

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses