Vulnerability Description
External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Prior to 2.4.1, a user who only has permission to create ExternalSecret resources can cause the operator to create a Secret that Kubernetes will automatically populate with a long-lived token for the specified service account. This effectively allows the user to impersonate any service account in the namespace without needing direct create permissions on TokenRequest or Secrets of that type. This vulnerability is fixed in 2.4.1.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/external-secrets/external-secrets/commit/4ddd240af7fe88725d98
- https://github.com/external-secrets/external-secrets/releases/tag/v2.4.1
- https://github.com/external-secrets/external-secrets/security/advisories/GHSA-fq
FAQ
What is CVE-2026-42876?
CVE-2026-42876 is a vulnerability with a CVSS score of 4.9 (MEDIUM). External Secrets Operator reads information from a third-party service and automatically injects the values as Kubernetes Secrets. Prior to 2.4.1, a user who only has permission to create ExternalSecr...
How severe is CVE-2026-42876?
CVE-2026-42876 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42876?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.