Description
External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Prior to 2.4.0, Namespaced SecretStore resources that used CAProvider with type ConfigMap could resolve CA material from another namespace when caProvider.namespace was set. This bypassed the namespace boundary enforced for SecretStore-backed references in providers that rely on the shared runtime CA resolver. This vulnerability is fixed in 2.4.0.
Published: 2026-05-11
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

External Secrets Operator allows a Namespaced SecretStore that uses a CAProvider of type ConfigMap to resolve certificate authority material from a different namespace when the field caProvider.namespace is set. Because the operator does not enforce namespace isolation for this resolution, the vulnerability leads to unintended cross‑namespace access. The consequence is potential exposure of CA certificates that can be used as credential material, compromising confidentiality for any resource in the target namespace. This flaw is a form of broken access control (CWE‑285) and improper permission handling for system data (CWE‑668). The affected functionality is restricted to the CAProvider resolution logic; it does not provide full system compromise or privilege escalation, but it can be abused by any actor who can create or modify SecretStore resources.

Affected Systems

Vendors: external‑secrets (External Secrets Operator). Product: External Secrets Operator. Versions affected: any release prior to 2.4.0; the issue is addressed in 2.4.0 and later.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. EPSS data is not available and the vulnerability is not listed in CISA KEV. Because the flaw requires the ability to create or modify SecretStore and CAProvider objects, the attack vector is likely internal to a Kubernetes cluster and depends on sufficient RBAC permissions. Attackers who can provision such resources could read ConfigMap data in other namespaces and expose CA certificates. The risk is limited in scope but should be mitigated promptly by applying the fix.

Generated by OpenCVE AI on May 11, 2026 at 20:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade External Secrets Operator to version 2.4.0 or later.
  • After the upgrade, review existing CAProvider configurations and ensure the caProvider.namespace field points only to the SecretStore’s own namespace or is omitted; update any misconfigured resources.
  • Restrict the RBAC permissions that allow creation or modification of SecretStore and CAProvider objects so that only trusted administrators can apply them.
  • If an immediate upgrade is not possible, deny cross‑namespace read access to ConfigMaps through RBAC to prevent exploitation of the CAProvider resolution path.

Generated by OpenCVE AI on May 11, 2026 at 20:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-wv26-88m5-6h59 External Secrets Operator has Namespace Isolation Bypass in CAProvider ConfigMap Resolution for SecretStore
History

Mon, 11 May 2026 20:45:00 +0000

Type Values Removed Values Added
First Time appeared External-secrets
External-secrets external-secrets
Vendors & Products External-secrets
External-secrets external-secrets

Mon, 11 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Prior to 2.4.0, Namespaced SecretStore resources that used CAProvider with type ConfigMap could resolve CA material from another namespace when caProvider.namespace was set. This bypassed the namespace boundary enforced for SecretStore-backed references in providers that rely on the shared runtime CA resolver. This vulnerability is fixed in 2.4.0.
Title External Secrets Operator: Namespace Isolation Bypass in CAProvider ConfigMap Resolution for SecretStore
Weaknesses CWE-285
CWE-668
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

External-secrets External-secrets
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-05-12T16:25:13.165Z

Reserved: 2026-04-30T18:49:06.711Z

Link: CVE-2026-42875

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-11T20:25:44.143

Modified: 2026-05-11T20:25:44.143

Link: CVE-2026-42875

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T20:30:16Z

Weaknesses