Description
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Prior to 1.11.1, a validation bypass in the VolumeMount path restriction allows mounting volumes under restricted /tekton/ internal paths by using .. path traversal components. The restriction check uses strings.HasPrefix without filepath.Clean, so a path like /tekton/home/../results passes validation but resolves to /tekton/results at runtime. This vulnerability is fixed in 1.11.1.
Published: 2026-04-21
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality & Integrity
Action: Patch Now
AI Analysis

Impact

A validation bug in Tekton Pipelines before version 1.11.1 allows an attacker to mount volumes under the protected /tekton/ internal directories by using path traversal components that bypass the mount‑path check. The check incorrectly relies on strings.HasPrefix without normalizing the path, so inputs such as /tekton/home/../results pass validation but resolve to /tekton/results at runtime. This can expose internal data or allow an attacker to place malicious files in locations that the pipeline assumes are safe, potentially compromising pipeline integrity and confidentiality of secret data.

Affected Systems

Tekton Pipelines (tektoncd:pipeline). All releases prior to 1.11.1 are affected. The vulnerability is fixed starting with pipeline release v1.11.1.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the ability to supply a task definition (or other resource) that contains a VolumeMount with a path designed to traverse beyond /tekton/. The attacker does not need network access to the host; the vulnerability is local to the Kubernetes cluster where Tekton Pipelines is running.

Generated by OpenCVE AI on April 22, 2026 at 06:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Tekton Pipelines to version 1.11.1 or later.
  • Verify that all existing Pipeline resources are using voluntary volume mounts within /tekton/ and adjust any that use traversal constructs to comply with the latest validation rules.
  • Restrict the ability to create or modify Pipeline tasks and VolumeMount definitions to trusted users or namespaces to limit potential exploit exposure.

Generated by OpenCVE AI on April 22, 2026 at 06:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rx35-6rhx-7858 Tekton Pipelines: VolumeMount path restriction bypass via missing filepath.Clean in /tekton/ check
History

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
First Time appeared Tektoncd
Tektoncd pipeline
Vendors & Products Tektoncd
Tektoncd pipeline

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Prior to 1.11.1, a validation bypass in the VolumeMount path restriction allows mounting volumes under restricted /tekton/ internal paths by using .. path traversal components. The restriction check uses strings.HasPrefix without filepath.Clean, so a path like /tekton/home/../results passes validation but resolves to /tekton/results at runtime. This vulnerability is fixed in 1.11.1.
Title Tekton Pipelines: VolumeMount path restriction bypass via missing filepath.Clean in /tekton/ check
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Tektoncd Pipeline
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-22T13:51:13.268Z

Reserved: 2026-04-15T20:40:15.517Z

Link: CVE-2026-40923

cve-icon Vulnrichment

Updated: 2026-04-22T13:51:03.320Z

cve-icon NVD

Status : Received

Published: 2026-04-21T21:16:45.543

Modified: 2026-04-21T21:16:45.543

Link: CVE-2026-40923

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T06:30:10Z

Weaknesses