Impact
A validation bug in Tekton Pipelines before version 1.11.1 allows an attacker to mount volumes under the protected /tekton/ internal directories by using path traversal components that bypass the mount‑path check. The check incorrectly relies on strings.HasPrefix without normalizing the path, so inputs such as /tekton/home/../results pass validation but resolve to /tekton/results at runtime. This can expose internal data or allow an attacker to place malicious files in locations that the pipeline assumes are safe, potentially compromising pipeline integrity and confidentiality of secret data.
Affected Systems
Tekton Pipelines (tektoncd:pipeline). All releases prior to 1.11.1 are affected. The vulnerability is fixed starting with pipeline release v1.11.1.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity. No EPSS score is available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires the ability to supply a task definition (or other resource) that contains a VolumeMount with a path designed to traverse beyond /tekton/. The attacker does not need network access to the host; the vulnerability is local to the Kubernetes cluster where Tekton Pipelines is running.
OpenCVE Enrichment
Github GHSA