Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33022: CWE-129: Improper Validation of Array Index in tektoncd pipeline

0
Medium
VulnerabilityCVE-2026-33022cvecve-2026-33022cwe-129
Published: Fri Mar 20 2026 (03/20/2026, 07:48:15 UTC)
Source: CVE Database V5
Vendor/Project: tektoncd
Product: pipeline

Description

CVE-2026-33022 is a medium severity denial-of-service vulnerability in Tekton Pipelines affecting multiple versions prior to patched releases. It arises from improper validation of array indices when generating deterministic names for TaskRun or PipelineRun resources with custom resolver names longer than 30 characters. This causes the controller to panic due to invalid string slicing, leading to a cluster-wide controller crash and a CrashLoopBackOff state. The impact blocks all CI/CD pipeline reconciliation until the offending resource is manually removed. Built-in resolvers are unaffected, but any custom resolver name exceeding 30 characters triggers the issue. The vulnerability requires authenticated users with permission to create TaskRun or PipelineRun resources but no user interaction beyond resource creation. Fixed versions have been released that properly truncate the resolver name prefix to prevent the panic. Organizations using Tekton Pipelines with custom resolvers should upgrade immediately to avoid disruption.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:40:28 UTC

Technical Analysis

Tekton Pipelines is a Kubernetes-native framework for defining CI/CD pipelines. Versions 0.60.0 through 1.10.1 (with some gaps) contain a denial-of-service vulnerability identified as CVE-2026-33022, caused by improper validation of array indices (CWE-129) in the function GenerateDeterministicNameFromSpec. When a user creates a TaskRun or PipelineRun resource specifying a .spec.taskRef.resolver or .spec.pipelineRef.resolver string longer than 30 characters, the generated name exceeds the 63-character DNS-1123 label limit. The truncation logic attempts to slice the string but panics due to a negative index ([-1] slice bound) because the generated name contains no spaces. This panic crashes the Tekton controller, which then enters a CrashLoopBackOff state on restart because it continuously tries to reconcile the problematic resource. This effectively halts all pipeline reconciliation cluster-wide, causing denial of service for CI/CD operations. The vulnerability only affects custom resolvers with long names; built-in resolvers like git, cluster, bundles, and hub use short names and are unaffected. The issue requires the ability to create TaskRun or PipelineRun resources, which typically requires authenticated access with appropriate permissions. The fix, released in versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, changes the truncation logic to shorten the resolver-name prefix instead of the entire string, preserving the hash suffix for uniqueness and preventing the panic. No known exploits are reported in the wild as of publication.

Potential Impact

This vulnerability can cause a complete denial of service of Tekton Pipelines controllers in Kubernetes clusters, disrupting all CI/CD pipeline executions and automation relying on Tekton. Since the controller crashes and enters a CrashLoopBackOff, no pipeline runs can be processed until the offending resource is deleted or the controller is upgraded. This can severely impact development velocity, continuous integration, and deployment workflows, especially in organizations heavily reliant on Tekton for automation. The impact is cluster-wide, affecting all pipelines managed by the controller. Attackers with permission to create TaskRun or PipelineRun resources can exploit this to cause operational disruption. Although it does not affect confidentiality or integrity directly, the availability impact is significant. Recovery requires manual intervention or patching, which may cause downtime. The vulnerability is particularly critical in environments where Tekton is used as a central CI/CD platform and where custom resolvers are employed.

Mitigation Recommendations

Organizations should immediately upgrade Tekton Pipelines to one of the patched versions: 1.0.1, 1.3.3, 1.6.1, 1.9.2, or 1.10.2, depending on their current version. Until upgrade is possible, restrict permissions to create TaskRun and PipelineRun resources to trusted users only, minimizing the risk of malicious or accidental creation of resources with long resolver names. Implement admission controllers or Kubernetes policies to validate and reject TaskRun or PipelineRun resources with .spec.taskRef.resolver or .spec.pipelineRef.resolver strings longer than 30 characters. Monitor controller logs for panic or CrashLoopBackOff states and have procedures to quickly identify and delete offending resources. Review and audit custom resolver naming conventions to ensure names are within safe length limits. Consider isolating Tekton controllers in dedicated namespaces or clusters to limit blast radius. Maintain regular backups of pipeline configurations to facilitate recovery. Engage with Tekton community updates for any further patches or mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T17:22:14.667Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bcfd2fe32a4fbe5f3cd696

Added to database: 3/20/2026, 7:54:23 AM

Last enriched: 3/27/2026, 7:40:28 PM

Last updated: 5/2/2026, 9:10:02 PM

Views: 69

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses