Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was discovered in Gardener prior to versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 that could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster(s) where their shoot clusters are managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. `gardener/gardener` (`gardenlet`) is the affected component. Versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 fix the issue.
Metrics
Affected Vendors & Products
References
History
Tue, 20 May 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 19 May 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was discovered in Gardener prior to versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 that could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster(s) where their shoot clusters are managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. `gardener/gardener` (`gardenlet`) is the affected component. Versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 fix the issue. | |
Title | Bypassing project secret validation can lead to privilege escalation | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-19T18:46:11.863Z
Updated: 2025-05-20T13:10:08.239Z
Reserved: 2025-05-05T16:53:10.373Z
Link: CVE-2025-47283

Updated: 2025-05-20T13:10:04.170Z

Status : Awaiting Analysis
Published: 2025-05-19T19:15:51.747
Modified: 2025-05-21T20:25:16.407
Link: CVE-2025-47283

No data.