CVE-2026-33211

Source
https://cve.org/CVERecord?id=CVE-2026-33211
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33211.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-33211
Aliases
Downstream
Related
Published
2026-03-23T23:55:54.089Z
Modified
2026-04-10T05:42:39.823275Z
Severity
  • 9.6 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N CVSS Calculator
Summary
Tekton Pipelines git resolver has path traversal that allows reading arbitrary files from the resolver pod
Details

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal via the pathInRepo parameter. A tenant with permission to create ResolutionRequests (e.g. by creating TaskRuns or PipelineRuns that use the git resolver) can read arbitrary files from the resolver pod's filesystem, including ServiceAccount tokens. The file contents are returned base64-encoded in resolutionrequest.status.data. Versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2 contain a patch.

Database specific
{
    "cwe_ids": [
        "CWE-22"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/33xxx/CVE-2026-33211.json"
}
References

Affected packages

Git / github.com/tektoncd/pipeline

Affected ranges

Type
GIT
Repo
https://github.com/tektoncd/pipeline
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.0.0"
        },
        {
            "fixed": "1.0.1"
        }
    ]
}
Type
GIT
Repo
https://github.com/tektoncd/pipeline
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.1.0"
        },
        {
            "fixed": "1.3.3"
        }
    ]
}
Type
GIT
Repo
https://github.com/tektoncd/pipeline
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.4.0"
        },
        {
            "fixed": "1.6.1"
        }
    ]
}
Type
GIT
Repo
https://github.com/tektoncd/pipeline
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.7.0"
        },
        {
            "fixed": "1.9.2"
        }
    ]
}
Type
GIT
Repo
https://github.com/tektoncd/pipeline
Events
Database specific
{
    "versions": [
        {
            "introduced": "1.10.0"
        },
        {
            "fixed": "1.10.2"
        }
    ]
}

Affected versions

v1.*
v1.0.0
v1.1.0
v1.10.0
v1.10.1
v1.2.0
v1.3.0
v1.3.1
v1.3.2
v1.4.0
v1.5.0
v1.6.0
v1.7.0
v1.9.0
v1.9.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-33211.json"