Description
Bitnami Sealed Secrets is vulnerable to a scope-widening attack during
the secret rotation (/v1/rotate) flow. The rotation handler derives the
sealing scope for the newly encrypted output from untrusted
spec.template.metadata.annotations present in the input SealedSecret.
By submitting a victim SealedSecret to the rotate endpoint with the
annotation sealedsecrets.bitnami.com/cluster-wide=true injected into the
template metadata, a remote attacker can obtain a rotated version of the
secret that is cluster-wide. This bypasses original "strict" or
"namespace-wide" constraints, allowing the attacker to retarget and unseal
the secret in any namespace or under any name to recover the plaintext
credentials.
Published: 2026-02-26
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Secret Disclosure
Action: Patch Immediately
AI Analysis

Impact

Bitnami Sealed Secrets allows secret rotation through the /v1/rotate endpoint. The rotation logic incorrectly derives the sealing scope from untrusted template annotations in the submitted SealedSecret. If an attacker injects the annotation sealedsecrets.bitnami.com/cluster-wide=true, the rotated secret becomes cluster‑wide, bypassing namespace restrictions. This permits the attacker to unseal or retrieve the plaintext credentials in any namespace or for any name, resulting in confidential data exposure.

Affected Systems

The vulnerability affects the Bitnami Sealed Secrets component used in Kubernetes clusters. All versions that expose the /v1/rotate API are impacted; no specific version range was provided in the advisory.

Risk and Exploitability

The CVSS score is 4.9, indicating moderate risk, and the EPSS probability is less than 1%, suggesting low exploitation likelihood. The security community has not listed this issue in the CISA KEV catalog. Exploitation requires the ability to submit a SealedSecret to the rotation endpoint, which is typically controlled by users with create permissions in a namespace. A malicious user able to do so can craft a SealedSecret containing the cluster‑wide annotation, obtain a rotated cluster‑wide secret, and unseal it elsewhere to recover sensitive data.

Generated by OpenCVE AI on April 17, 2026 at 14:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest patch or upgrade Bitnami Sealed Secrets to a version that removes the untrusted annotation source from the rotation process.
  • Restrict access to the /v1/rotate API by configuring RBAC rules so that only trusted service accounts or users can perform secret rotation.
  • Monitor SealedSecret objects for the presence of the sealedsecrets.bitnami.com/cluster-wide annotation and investigate any unauthorized occurrences.
  • Disable the rotation feature if it is not required in your environment.

Generated by OpenCVE AI on April 17, 2026 at 14:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-465p-v42x-3fmj Sealed Secrets for Kubernetes: Rotate API Allows Scope Widening from Strict/Namespace-Wide to Cluster-Wide via Untrusted Template Annotations
History

Fri, 27 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Feb 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Bitnami
Bitnami sealed-secrets
Vendors & Products Bitnami
Bitnami sealed-secrets

Thu, 26 Feb 2026 01:30:00 +0000

Type Values Removed Values Added
Description Bitnami Sealed Secrets is vulnerable to a scope-widening attack during the secret rotation (/v1/rotate) flow. The rotation handler derives the sealing scope for the newly encrypted output from untrusted spec.template.metadata.annotations present in the input SealedSecret. By submitting a victim SealedSecret to the rotate endpoint with the annotation sealedsecrets.bitnami.com/cluster-wide=true injected into the template metadata, a remote attacker can obtain a rotated version of the secret that is cluster-wide. This bypasses original "strict" or "namespace-wide" constraints, allowing the attacker to retarget and unseal the secret in any namespace or under any name to recover the plaintext credentials.
Title sealed-secrets /v1/rotate can widen sealing scope to cluster-wide via attacker-controlled template annotations
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Bitnami Sealed-secrets
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-02-26T15:58:32.372Z

Reserved: 2026-01-09T06:54:41.497Z

Link: CVE-2026-22728

cve-icon Vulnrichment

Updated: 2026-02-26T15:58:19.231Z

cve-icon NVD

Status : Deferred

Published: 2026-02-26T02:16:20.187

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22728

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T14:45:21Z

Weaknesses