CVE-2026-33022: CWE-129: Improper Validation of Array Index in tektoncd pipeline
CVE-2026-33022 is a medium severity denial-of-service vulnerability in Tekton Pipelines affecting multiple versions prior to patched releases. It arises from improper validation of array indices when generating deterministic names for TaskRun or PipelineRun resources with custom resolver names longer than 30 characters. This causes the controller to panic due to invalid string slicing, leading to a cluster-wide controller crash and a CrashLoopBackOff state. The impact blocks all CI/CD pipeline reconciliation until the offending resource is manually removed. Built-in resolvers are unaffected, but any custom resolver name exceeding 30 characters triggers the issue. The vulnerability requires authenticated users with permission to create TaskRun or PipelineRun resources but no user interaction beyond resource creation. Fixed versions have been released that properly truncate the resolver name prefix to prevent the panic. Organizations using Tekton Pipelines with custom resolvers should upgrade immediately to avoid disruption.
AI Analysis
Technical Summary
Tekton Pipelines is a Kubernetes-native framework for defining CI/CD pipelines. Versions 0.60.0 through 1.10.1 (with some gaps) contain a denial-of-service vulnerability identified as CVE-2026-33022, caused by improper validation of array indices (CWE-129) in the function GenerateDeterministicNameFromSpec. When a user creates a TaskRun or PipelineRun resource specifying a .spec.taskRef.resolver or .spec.pipelineRef.resolver string longer than 30 characters, the generated name exceeds the 63-character DNS-1123 label limit. The truncation logic attempts to slice the string but panics due to a negative index ([-1] slice bound) because the generated name contains no spaces. This panic crashes the Tekton controller, which then enters a CrashLoopBackOff state on restart because it continuously tries to reconcile the problematic resource. This effectively halts all pipeline reconciliation cluster-wide, causing denial of service for CI/CD operations. The vulnerability only affects custom resolvers with long names; built-in resolvers like git, cluster, bundles, and hub use short names and are unaffected. The issue requires the ability to create TaskRun or PipelineRun resources, which typically requires authenticated access with appropriate permissions. The fix, released in versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, changes the truncation logic to shorten the resolver-name prefix instead of the entire string, preserving the hash suffix for uniqueness and preventing the panic. No known exploits are reported in the wild as of publication.
Potential Impact
This vulnerability can cause a complete denial of service of Tekton Pipelines controllers in Kubernetes clusters, disrupting all CI/CD pipeline executions and automation relying on Tekton. Since the controller crashes and enters a CrashLoopBackOff, no pipeline runs can be processed until the offending resource is deleted or the controller is upgraded. This can severely impact development velocity, continuous integration, and deployment workflows, especially in organizations heavily reliant on Tekton for automation. The impact is cluster-wide, affecting all pipelines managed by the controller. Attackers with permission to create TaskRun or PipelineRun resources can exploit this to cause operational disruption. Although it does not affect confidentiality or integrity directly, the availability impact is significant. Recovery requires manual intervention or patching, which may cause downtime. The vulnerability is particularly critical in environments where Tekton is used as a central CI/CD platform and where custom resolvers are employed.
Mitigation Recommendations
Organizations should immediately upgrade Tekton Pipelines to one of the patched versions: 1.0.1, 1.3.3, 1.6.1, 1.9.2, or 1.10.2, depending on their current version. Until upgrade is possible, restrict permissions to create TaskRun and PipelineRun resources to trusted users only, minimizing the risk of malicious or accidental creation of resources with long resolver names. Implement admission controllers or Kubernetes policies to validate and reject TaskRun or PipelineRun resources with .spec.taskRef.resolver or .spec.pipelineRef.resolver strings longer than 30 characters. Monitor controller logs for panic or CrashLoopBackOff states and have procedures to quickly identify and delete offending resources. Review and audit custom resolver naming conventions to ensure names are within safe length limits. Consider isolating Tekton controllers in dedicated namespaces or clusters to limit blast radius. Maintain regular backups of pipeline configurations to facilitate recovery. Engage with Tekton community updates for any further patches or mitigations.
Affected Countries
United States, Germany, Japan, India, United Kingdom, Canada, Australia, Netherlands, France, South Korea
CVE-2026-33022: CWE-129: Improper Validation of Array Index in tektoncd pipeline
Description
CVE-2026-33022 is a medium severity denial-of-service vulnerability in Tekton Pipelines affecting multiple versions prior to patched releases. It arises from improper validation of array indices when generating deterministic names for TaskRun or PipelineRun resources with custom resolver names longer than 30 characters. This causes the controller to panic due to invalid string slicing, leading to a cluster-wide controller crash and a CrashLoopBackOff state. The impact blocks all CI/CD pipeline reconciliation until the offending resource is manually removed. Built-in resolvers are unaffected, but any custom resolver name exceeding 30 characters triggers the issue. The vulnerability requires authenticated users with permission to create TaskRun or PipelineRun resources but no user interaction beyond resource creation. Fixed versions have been released that properly truncate the resolver name prefix to prevent the panic. Organizations using Tekton Pipelines with custom resolvers should upgrade immediately to avoid disruption.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
Tekton Pipelines is a Kubernetes-native framework for defining CI/CD pipelines. Versions 0.60.0 through 1.10.1 (with some gaps) contain a denial-of-service vulnerability identified as CVE-2026-33022, caused by improper validation of array indices (CWE-129) in the function GenerateDeterministicNameFromSpec. When a user creates a TaskRun or PipelineRun resource specifying a .spec.taskRef.resolver or .spec.pipelineRef.resolver string longer than 30 characters, the generated name exceeds the 63-character DNS-1123 label limit. The truncation logic attempts to slice the string but panics due to a negative index ([-1] slice bound) because the generated name contains no spaces. This panic crashes the Tekton controller, which then enters a CrashLoopBackOff state on restart because it continuously tries to reconcile the problematic resource. This effectively halts all pipeline reconciliation cluster-wide, causing denial of service for CI/CD operations. The vulnerability only affects custom resolvers with long names; built-in resolvers like git, cluster, bundles, and hub use short names and are unaffected. The issue requires the ability to create TaskRun or PipelineRun resources, which typically requires authenticated access with appropriate permissions. The fix, released in versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, changes the truncation logic to shorten the resolver-name prefix instead of the entire string, preserving the hash suffix for uniqueness and preventing the panic. No known exploits are reported in the wild as of publication.
Potential Impact
This vulnerability can cause a complete denial of service of Tekton Pipelines controllers in Kubernetes clusters, disrupting all CI/CD pipeline executions and automation relying on Tekton. Since the controller crashes and enters a CrashLoopBackOff, no pipeline runs can be processed until the offending resource is deleted or the controller is upgraded. This can severely impact development velocity, continuous integration, and deployment workflows, especially in organizations heavily reliant on Tekton for automation. The impact is cluster-wide, affecting all pipelines managed by the controller. Attackers with permission to create TaskRun or PipelineRun resources can exploit this to cause operational disruption. Although it does not affect confidentiality or integrity directly, the availability impact is significant. Recovery requires manual intervention or patching, which may cause downtime. The vulnerability is particularly critical in environments where Tekton is used as a central CI/CD platform and where custom resolvers are employed.
Mitigation Recommendations
Organizations should immediately upgrade Tekton Pipelines to one of the patched versions: 1.0.1, 1.3.3, 1.6.1, 1.9.2, or 1.10.2, depending on their current version. Until upgrade is possible, restrict permissions to create TaskRun and PipelineRun resources to trusted users only, minimizing the risk of malicious or accidental creation of resources with long resolver names. Implement admission controllers or Kubernetes policies to validate and reject TaskRun or PipelineRun resources with .spec.taskRef.resolver or .spec.pipelineRef.resolver strings longer than 30 characters. Monitor controller logs for panic or CrashLoopBackOff states and have procedures to quickly identify and delete offending resources. Review and audit custom resolver naming conventions to ensure names are within safe length limits. Consider isolating Tekton controllers in dedicated namespaces or clusters to limit blast radius. Maintain regular backups of pipeline configurations to facilitate recovery. Engage with Tekton community updates for any further patches or mitigations.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-17T17:22:14.667Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bcfd2fe32a4fbe5f3cd696
Added to database: 3/20/2026, 7:54:23 AM
Last enriched: 3/27/2026, 7:40:28 PM
Last updated: 5/2/2026, 9:10:02 PM
Views: 69
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.