Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors. The default behavior exists to make the “getting started” experience smooth: new users can experiment with Pepr and create resources dynamically without needing to pre-configure RBAC. This vulnerability is fixed in 1.0.5.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-w54x-r83c-x79q Pepr Has Overly Permissive RBAC ClusterRole in Admin Mode
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 16 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
Description Pepr is a type safe K8s middleware. Prior to 1.0.5 , Pepr defaults to a cluster-admin RBAC configuration and does not explicitly force or enforce least-privilege guidance for module authors. The default behavior exists to make the “getting started” experience smooth: new users can experiment with Pepr and create resources dynamically without needing to pre-configure RBAC. This vulnerability is fixed in 1.0.5.
Title Pepr Overly Permissive RBAC ClusterRole in Admin Mode
Weaknesses CWE-272
References
Metrics cvssV3_1

{'score': 0, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-01-16T21:38:59.905Z

Reserved: 2026-01-14T16:08:37.483Z

Link: CVE-2026-23634

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-16T20:15:49.733

Modified: 2026-01-16T20:15:49.733

Link: CVE-2026-23634

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses