Description
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Prior to 1.11.1, a validation bypass in the VolumeMount path restriction allows mounting volumes under restricted /tekton/ internal paths by using .. path traversal components. The restriction check uses strings.HasPrefix without filepath.Clean, so a path like /tekton/home/../results passes validation but resolves to /tekton/results at runtime. This vulnerability is fixed in 1.11.1.
Published: 2026-04-21
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality & Integrity
Action: Patch Now
AI Analysis

Impact

A validation bug in Tekton Pipelines before version 1.11.1 allows an attacker to mount volumes under the protected /tekton/ internal directories by using path traversal components that bypass the mount‑path check. The check incorrectly relies on strings.HasPrefix without normalizing the path, so inputs such as /tekton/home/../results pass validation but resolve to /tekton/results at runtime. This can expose internal data or allow an attacker to place malicious files in locations that the pipeline assumes are safe, potentially compromising pipeline integrity and confidentiality of secret data.

Affected Systems

Tekton Pipelines (tektoncd:pipeline). All releases prior to 1.11.1 are affected. The vulnerability is fixed starting with pipeline release v1.11.1.

Risk and Exploitability

The CVSS score of 5.4 indicates moderate severity. The EPSS score of <1% indicates a very low but nonzero probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the ability to supply a task definition (or other resource) that contains a VolumeMount with a path designed to traverse beyond /tekton/. The attacker does not need network access to the host; the vulnerability is local to the Kubernetes cluster where Tekton Pipelines is running.

Generated by OpenCVE AI on April 29, 2026 at 02:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Tekton Pipelines to version 1.11.1 or later.
  • Verify that all existing Pipeline resources are using voluntary volume mounts within /tekton/ and adjust any that use traversal constructs to comply with the latest validation rules.
  • Restrict the ability to create or modify Pipeline tasks and VolumeMount definitions to trusted users or namespaces to limit potential exploit exposure.

Generated by OpenCVE AI on April 29, 2026 at 02:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-rx35-6rhx-7858 Tekton Pipelines: VolumeMount path restriction bypass via missing filepath.Clean in /tekton/ check
History

Tue, 28 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-179
References
Metrics threat_severity

None

threat_severity

Moderate


Mon, 27 Apr 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Linuxfoundation
Linuxfoundation tekton Pipelines
CPEs cpe:2.3:a:linuxfoundation:tekton_pipelines:*:*:*:*:*:go:*:*
Vendors & Products Linuxfoundation
Linuxfoundation tekton Pipelines

Wed, 22 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 04:00:00 +0000

Type Values Removed Values Added
First Time appeared Tektoncd
Tektoncd pipeline
Vendors & Products Tektoncd
Tektoncd pipeline

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Description Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Prior to 1.11.1, a validation bypass in the VolumeMount path restriction allows mounting volumes under restricted /tekton/ internal paths by using .. path traversal components. The restriction check uses strings.HasPrefix without filepath.Clean, so a path like /tekton/home/../results passes validation but resolves to /tekton/results at runtime. This vulnerability is fixed in 1.11.1.
Title Tekton Pipelines: VolumeMount path restriction bypass via missing filepath.Clean in /tekton/ check
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Subscriptions

Linuxfoundation Tekton Pipelines
Tektoncd Pipeline
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-22T13:51:13.268Z

Reserved: 2026-04-15T20:40:15.517Z

Link: CVE-2026-40923

cve-icon Vulnrichment

Updated: 2026-04-22T13:51:03.320Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-21T21:16:45.543

Modified: 2026-04-27T18:07:23.070

Link: CVE-2026-40923

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-21T20:50:53Z

Links: CVE-2026-40923 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T02:45:35Z

Weaknesses