A validation bypass in the VolumeMount path restriction allows mounting volumes under restricted /tekton/ internal paths by using .. path traversal components. The restriction check uses strings.HasPrefix without filepath.Clean, so a path like /tekton/home/../results passes validation but resolves to /tekton/results at runtime.
Tekton Pipelines restricts VolumeMount paths under /tekton/ (except /tekton/home) to prevent users from interfering with internal execution state. The validation at pkg/apis/pipeline/v1/container_validation.go checks mount paths using strings.HasPrefix without normalizing the path first:
if strings.HasPrefix(vm.MountPath, "/tekton/") &&
!strings.HasPrefix(vm.MountPath, "/tekton/home") {
// reject
}
Because /tekton/home is an allowed prefix, a path like /tekton/home/../results passes both checks. At runtime, the container runtime resolves .. and the actual mount point becomes /tekton/results.
The same pattern exists in pkg/apis/pipeline/v1beta1/task_validation.go.
An authenticated user with Task or TaskRun creation permissions can mount volumes over internal Tekton paths, potentially:
A patch is available at v1.11.1.
.. components.All versions through v1.11.0 (both v1 and v1beta1 APIs).
This vulnerability was reported by @kodareef5.
{
"github_reviewed": true,
"nvd_published_at": null,
"cwe_ids": [
"CWE-22"
],
"github_reviewed_at": "2026-04-21T20:26:41Z",
"severity": "MODERATE"
}