Impact
Tekton Pipelines, which supplies Kubernetes‑style resources for CI/CD pipelines, contains a flaw in the git resolver. From version 1.0.0 up to just before 1.11.1, the resolver accepts a revision parameter that is directly passed as a positional argument to git fetch without checking whether it begins with a hyphen. This means an attacker with the ability to create or modify a ResolutionRequest can inject arbitrary git fetch flags, for example --upload-pack=<binary>. Because the validator for repository URLs also allows paths beginning with a slash, a malicious request can chain the injection to run an arbitrary binary on the resolver pod. The resolver runs under the tekton‑pipelines‑resolvers ServiceAccount, which has cluster‑wide get/list/watch permissions on all Secrets, so successful exploitation results in full cluster‑wide secret exfiltration. The vulnerability enables remote code execution and is classified as CWE‑88.
Affected Systems
Tekton Pipelines deployments using the tektoncd:pipeline project, specifically versions 1.0.0 through 1.11.0, are affected. Upgrading to 1.11.1 or later resolves the issue; systems running any earlier release remain vulnerable until a patch is applied.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity risk of arbitrary code execution. The EPSS score of 0.00088 indicates a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the capability to create or modify a ResolutionRequest, which can be achievable in multi-tenant or permissively configured namespaces. Successful exploitation results in the attacker gaining broad cluster access to Secrets via the resolver pod.
OpenCVE Enrichment
Github GHSA