kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Jun 2025 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes. | |
| Weaknesses | CWE-441 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: mitre
Published: 2025-06-04T05:50:48.639Z
Updated: 2025-06-04T13:23:37.851Z
Reserved: 2025-05-23T04:16:39.433Z
Link: CVE-2025-48710
Updated: 2025-06-04T13:23:34.371Z
Status : Awaiting Analysis
Published: 2025-06-04T06:15:21.390
Modified: 2025-06-04T14:54:33.783
Link: CVE-2025-48710
No data.