kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes.
History

Wed, 04 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Jun 2025 06:00:00 +0000

Type Values Removed Values Added
Description kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes.
Weaknesses CWE-441
References
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2025-06-04T05:50:48.639Z

Updated: 2025-06-04T13:23:37.851Z

Reserved: 2025-05-23T04:16:39.433Z

Link: CVE-2025-48710

cve-icon Vulnrichment

Updated: 2025-06-04T13:23:34.371Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-06-04T06:15:21.390

Modified: 2025-06-04T14:54:33.783

Link: CVE-2025-48710

cve-icon Redhat

No data.