kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 04 Jun 2025 06:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | kro (Kube Resource Orchestrator) 0.1.0 before 0.2.1 allows users (with permission to create or modify ResourceGraphDefinition resources) to supply arbitrary container images. This can lead to a confused-deputy scenario where kro's controllers deploy and run attacker-controlled images, resulting in unauthenticated remote code execution on cluster nodes. | |
Weaknesses | CWE-441 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-06-04T05:50:48.639Z
Updated: 2025-06-04T13:23:37.851Z
Reserved: 2025-05-23T04:16:39.433Z
Link: CVE-2025-48710

Updated: 2025-06-04T13:23:34.371Z

Status : Awaiting Analysis
Published: 2025-06-04T06:15:21.390
Modified: 2025-06-04T14:54:33.783
Link: CVE-2025-48710

No data.