Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33211: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in tektoncd pipeline

0
Critical
VulnerabilityCVE-2026-33211cvecve-2026-33211cwe-22
Published: Mon Mar 23 2026 (03/23/2026, 23:55:54 UTC)
Source: CVE Database V5
Vendor/Project: tektoncd
Product: pipeline

Description

CVE-2026-33211 is a critical path traversal vulnerability in Tekton Pipelines' git resolver affecting multiple versions prior to patched releases. It allows a tenant with permission to create ResolutionRequests to read arbitrary files from the resolver pod's filesystem by manipulating the pathInRepo parameter. This can lead to exposure of sensitive data such as ServiceAccount tokens, with file contents returned base64-encoded in the resolution request status. The vulnerability requires low attack complexity and no user interaction but does require privileges to create TaskRuns or PipelineRuns. Patched versions 1. 0. 1, 1. 3. 3, 1. 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 01:31:13 UTC

Technical Analysis

Tekton Pipelines is a Kubernetes-native framework for defining CI/CD pipelines. The vulnerability identified as CVE-2026-33211 is a path traversal flaw (CWE-22) in the git resolver component of Tekton Pipelines. Specifically, the git resolver uses a parameter called pathInRepo to specify paths within a git repository. In affected versions (>=1.0.0 and prior to 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2), this parameter is improperly sanitized, allowing an attacker with permission to create ResolutionRequests (typically via creating TaskRuns or PipelineRuns that use the git resolver) to traverse outside the intended directory boundaries. By exploiting this, an attacker can read arbitrary files on the resolver pod's filesystem, including sensitive files such as ServiceAccount tokens. The contents of these files are returned base64-encoded in the resolutionrequest.status.data field, enabling exfiltration of secrets. The vulnerability has a CVSS v3.1 score of 9.6 (critical), reflecting its high impact on confidentiality and integrity, low attack complexity, and the fact that it requires privileges to create pipeline runs but no user interaction. No known exploits in the wild have been reported yet, but the risk is significant due to the sensitive nature of the data exposed. The issue is fixed in versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2 by properly restricting path traversal in the pathInRepo parameter.

Potential Impact

The vulnerability allows attackers with limited permissions to read arbitrary files on the resolver pod, including Kubernetes ServiceAccount tokens. This can lead to unauthorized access to cluster resources, privilege escalation, and lateral movement within the Kubernetes environment. Exposure of ServiceAccount tokens can compromise the integrity and confidentiality of the CI/CD pipeline and the underlying infrastructure. Organizations relying on Tekton Pipelines for automated builds and deployments risk data leakage, pipeline sabotage, and potential full cluster compromise if attackers leverage stolen tokens. The impact is critical for organizations using affected versions, especially in multi-tenant or shared cluster environments where attackers may have limited initial privileges but can escalate via this flaw.

Mitigation Recommendations

1. Immediately upgrade Tekton Pipelines to one of the patched versions: 1.0.1, 1.3.3, 1.6.1, 1.9.2, or 1.10.2. 2. Restrict permissions to create TaskRuns and PipelineRuns that use the git resolver to trusted users only, minimizing the attack surface. 3. Audit existing ResolutionRequests and pipeline runs for suspicious pathInRepo parameters or unexpected base64-encoded data in resolutionrequest.status.data. 4. Implement Kubernetes RBAC policies to limit access to resolver pods and ServiceAccount tokens. 5. Monitor logs and network traffic for signs of exploitation attempts or unusual file access patterns. 6. Consider isolating CI/CD workloads in dedicated namespaces or clusters with minimal privileges. 7. Rotate ServiceAccount tokens and credentials if compromise is suspected. 8. Review and harden pod security policies to restrict filesystem access where possible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-17T23:23:58.313Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1e5e3f4197a8e3bb3f17b

Added to database: 3/24/2026, 1:16:19 AM

Last enriched: 3/24/2026, 1:31:13 AM

Last updated: 3/24/2026, 2:18:18 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses