Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32737: CWE-284: Improper Access Control in ctfer-io romeo

0
High
VulnerabilityCVE-2026-32737cvecve-2026-32737cwe-284
Published: Wed Mar 18 2026 (03/18/2026, 22:23:09 UTC)
Source: CVE Database V5
Vendor/Project: ctfer-io
Product: romeo

Description

Romeo gives the capability to reach high code coverage of Go ≥1.20 apps by helping to measure code coverage for functional and integration tests within GitHub Actions. Prior to version 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from the "hardened" namespace to any Pod out of it. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. Removing the `inter-ns` NetworkPolicy patches the vulnerability in version 0.2.1. If updates are not possible in production environments, manually delete `inter-ns` and update as soon as possible. Given one's context, delete the failing network policy that should be prefixed by `inter-ns-` in the target namespace.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:05:08 UTC

Technical Analysis

CVE-2026-32737 is an improper access control vulnerability (CWE-284) found in ctfer-io's romeo tool, which assists in measuring code coverage for Go applications (version 1.20 and above) within GitHub Actions workflows. Romeo versions prior to 0.2.1 include a mis-written Kubernetes NetworkPolicy named with the prefix 'inter-ns' that was intended to enforce namespace isolation by restricting network traffic between Pods in different namespaces. However, due to the misconfiguration, this NetworkPolicy inadvertently allows Pods in a supposedly hardened namespace to communicate with Pods outside that namespace. This breaks the security-by-default principle expected in Kubernetes deployments, enabling an attacker who has compromised a Pod in the hardened namespace to pivot laterally to other Pods across namespaces. The vulnerability does not require any privileges, authentication, or user interaction, and can be exploited remotely over the network. The scope of impact is high because it undermines Kubernetes namespace isolation, a fundamental security boundary. The vulnerability was addressed in romeo version 0.2.1 by removing the problematic inter-ns NetworkPolicy. For environments where immediate upgrade is not feasible, manual deletion of the inter-ns NetworkPolicy in the affected namespaces is advised to mitigate the risk. No known exploits are reported in the wild as of the publication date. The CVSS v4.0 base score is 7.9 (high), reflecting the network attack vector, no required privileges or user interaction, and the significant impact on security isolation within Kubernetes clusters.

Potential Impact

This vulnerability enables an attacker who gains access to a Pod within a hardened namespace to bypass Kubernetes network segmentation controls and move laterally to Pods in other namespaces. Such lateral movement can lead to unauthorized access to sensitive workloads, data exfiltration, privilege escalation, and potential cluster-wide compromise. Organizations relying on romeo for code coverage in CI/CD pipelines may inadvertently expose their Kubernetes clusters to increased risk if they use vulnerable versions. The breach of namespace isolation undermines multi-tenant security models and can facilitate advanced persistent threats within cloud-native environments. The impact is particularly severe in environments with sensitive or regulated data, where lateral movement can lead to compliance violations and significant operational disruption. Although no active exploits are known, the ease of exploitation and network accessibility make this a critical risk to address promptly.

Mitigation Recommendations

The primary mitigation is to upgrade romeo to version 0.2.1 or later, which removes the vulnerable inter-ns NetworkPolicy. If upgrading is not immediately possible, administrators should manually identify and delete any NetworkPolicy resources prefixed with 'inter-ns-' in the affected namespaces to restore proper network isolation. Additionally, organizations should audit their Kubernetes NetworkPolicies to ensure they enforce strict namespace isolation and verify that no unintended network access is permitted between namespaces. Implementing network segmentation monitoring and anomaly detection can help identify suspicious lateral movement attempts. Regularly reviewing CI/CD pipeline tools and their network configurations is recommended to prevent similar misconfigurations. Finally, applying the principle of least privilege to Pod permissions and restricting access to the Kubernetes API can reduce the risk of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T15:02:00.627Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bb2a8a771bdb1749cbc621

Added to database: 3/18/2026, 10:43:22 PM

Last enriched: 3/26/2026, 1:05:08 AM

Last updated: 5/2/2026, 2:08:47 PM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses