Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2808: CWE-59: Improper Link Resolution Before File Access (Link Following) in HashiCorp Consul

0
Medium
VulnerabilityCVE-2026-2808cvecve-2026-2808cwe-59
Published: Wed Mar 11 2026 (03/11/2026, 23:08:32 UTC)
Source: CVE Database V5
Vendor/Project: HashiCorp
Product: Consul

Description

CVE-2026-2808 is a vulnerability in HashiCorp Consul versions 1. 18. 20 up to 1. 21. 10 and 1. 22. 4 that allows arbitrary file read due to improper link resolution before file access when Kubernetes authentication is enabled. This flaw, categorized under CWE-59 (Improper Link Resolution Before File Access), can be exploited remotely with network access and requires high privileges but no user interaction. The vulnerability impacts confidentiality by exposing sensitive files without affecting integrity or availability. It has a CVSS score of 6.

AI-Powered Analysis

AILast updated: 03/11/2026, 23:44:05 UTC

Technical Analysis

CVE-2026-2808 is a security vulnerability identified in HashiCorp Consul and Consul Enterprise versions 1.18.20 through 1.21.10 and 1.22.4. The issue arises from improper link resolution before file access, classified under CWE-59, which allows an attacker to perform arbitrary file reads on the system where Consul is deployed. This vulnerability specifically manifests when Consul is configured to use Kubernetes authentication, a common setup in cloud-native environments. The flaw enables an attacker with network access and high privileges (PR:H) to bypass intended file access restrictions by exploiting symbolic link (symlink) handling flaws, potentially reading sensitive files that should be protected. The vulnerability does not require user interaction and does not impact file integrity or system availability, but it compromises confidentiality by exposing potentially sensitive configuration or credential files. The CVSS v3.1 base score is 6.8, reflecting a medium severity level due to the need for elevated privileges and the confidentiality impact. HashiCorp has addressed this vulnerability in Consul versions 1.18.21, 1.21.11, and 1.22.5. No public exploits have been reported to date, but the vulnerability poses a risk in environments where Consul is integrated with Kubernetes authentication, which is prevalent in modern DevOps and cloud infrastructure deployments.

Potential Impact

The primary impact of CVE-2026-2808 is the unauthorized disclosure of sensitive information through arbitrary file reads. Attackers who gain high-level access to the network can exploit this vulnerability to access configuration files, credentials, or other sensitive data stored on the Consul server. This can lead to further compromise of the infrastructure, including lateral movement within the network or escalation of privileges. Although the vulnerability does not affect data integrity or system availability, the confidentiality breach can have severe consequences, such as exposure of secrets, API keys, or internal system details. Organizations relying on Kubernetes authentication with Consul are particularly at risk, as this configuration is common in cloud-native and microservices architectures. The vulnerability's exploitation could undermine trust in the security of service discovery and configuration management, potentially impacting DevOps workflows and automated deployment pipelines globally.

Mitigation Recommendations

To mitigate CVE-2026-2808, organizations should immediately upgrade HashiCorp Consul to the patched versions 1.18.21, 1.21.11, or 1.22.5, depending on their current version. In environments where immediate patching is not feasible, administrators should review and restrict access controls to the Consul server, limiting network exposure and ensuring that only trusted, high-privilege users can access the Kubernetes authentication endpoints. Additionally, auditing and monitoring file access patterns on Consul servers can help detect anomalous behavior indicative of exploitation attempts. It is also advisable to review the configuration of Kubernetes authentication to ensure minimal privileges are granted and to implement network segmentation to isolate Consul instances from untrusted networks. Regularly rotating secrets and credentials stored or managed by Consul can reduce the impact of any potential data exposure. Finally, organizations should maintain up-to-date inventories of their Consul deployments and integrate vulnerability scanning into their CI/CD pipelines to detect and remediate such vulnerabilities promptly.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
HashiCorp
Date Reserved
2026-02-19T15:17:24.550Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b1faec2f860ef94395a3ac

Added to database: 3/11/2026, 11:29:48 PM

Last enriched: 3/11/2026, 11:44:05 PM

Last updated: 3/12/2026, 12:38:19 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses