CVE-2026-25538

Source
https://cve.org/CVERecord?id=CVE-2026-25538
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25538.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25538
Aliases
Published
2026-02-04T21:37:04.483Z
Modified
2026-02-06T21:35:21.586510Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
Devtron Attributes API Unauthorized Access Leading to API Token Signing Key Leakage
Details

Devtron is an open source tool integration platform for Kubernetes. In version 2.0.0 and prior, a vulnerability exists in Devtron's Attributes API interface, allowing any authenticated user (including low-privileged CI/CD Developers) to obtain the global API Token signing key by accessing the /orchestrator/attributes?key=apiTokenSecret endpoint. After obtaining the key, attackers can forge JWT tokens for arbitrary user identities offline, thereby gaining complete control over the Devtron platform and laterally moving to the underlying Kubernetes cluster. This issue has been patched via commit d2b0d26.

Database specific
{
    "cwe_ids": [
        "CWE-862"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25538.json"
}
References

Affected packages

Git / github.com/devtron-labs/devtron

Affected ranges

Type
GIT
Repo
https://github.com/devtron-labs/devtron
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.2.15
v0.2.37
v0.3.26
v0.4.0
v0.6.25
v1.*
v1.3.0
v1.3.1
v1.4.0
v1.5.0
v1.5.1
v1.6.0
v1.7.0
v1.8.0
v1.8.1
v1.8.2
v2.*
v2.0.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25538.json"