CVE-2026-22822

Source
https://cve.org/CVERecord?id=CVE-2026-22822
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22822.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-22822
Aliases
Downstream
Published
2026-01-21T21:22:05.249Z
Modified
2026-01-28T05:51:54.148486Z
Severity
  • 9.3 (Critical) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
External Secrets Operator insecurely retrieves secrets through the getSecretKey templating function
Details

External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Starting in version 0.20.2 and prior to version 1.2.0, the getSecretKey template function, while introduced for senhasegura Devops Secrets Management (DSM) provider, has the ability to fetch secrets cross-namespaces with the roleBinding of the external-secrets controller, bypassing our security mechanisms. This function was completely removed in version 1.2.0, as everything done with that templating function can be done in a different way while respecting External Secrets Operator's safeguards As a workaround, use a policy engine such as Kubernetes, Kyverno, Kubewarden, or OPA to prevent the usage of getSecretKey in any ExternalSecret resource.

Database specific
{
    "cwe_ids": [
        "CWE-863"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/22xxx/CVE-2026-22822.json"
}
References

Affected packages

Git / github.com/external-secrets/external-secrets

Affected ranges

Type
GIT
Repo
https://github.com/external-secrets/external-secrets
Events

Affected versions

helm-chart-0.*

helm-chart-0.20.2
helm-chart-0.20.3
helm-chart-0.20.4

helm-chart-1.*

helm-chart-1.0.0
helm-chart-1.1.0
helm-chart-1.1.1

v0.*

v0.2.0-esoctl
v0.2.1-esoctl
v0.20.2
v0.20.3
v0.20.4

v1.*

v1.0.0
v1.1.0
v1.1.1

Database specific

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-22822.json"