Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was discovered in Gardener prior to versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 that could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster(s) where their shoot clusters are managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. `gardener/gardener` (`gardenlet`) is the affected component. Versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 fix the issue.
Metrics
Affected Vendors & Products
References
History
Mon, 19 May 2025 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Gardener implements the automated management and operation of Kubernetes clusters as a service. A security vulnerability was discovered in Gardener prior to versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 that could allow a user with administrative privileges for a Gardener project to obtain control over the seed cluster(s) where their shoot clusters are managed. This CVE affects all Gardener installations no matter of the public cloud provider(s) used for the seed clusters/shoot clusters. `gardener/gardener` (`gardenlet`) is the affected component. Versions 1.116.4, 1.117.5, 1.118.2, and 1.119.0 fix the issue. | |
Title | Bypassing project secret validation can lead to privilege escalation | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-05-19T18:46:11.863Z
Updated: 2025-05-19T18:46:11.863Z
Reserved: 2025-05-05T16:53:10.373Z
Link: CVE-2025-47283

No data.

Status : Received
Published: 2025-05-19T19:15:51.747
Modified: 2025-05-19T19:15:51.747
Link: CVE-2025-47283

No data.