Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.6
Arbitrary file read in Tekton Pipelines git resolver
GHSA-j5q5-j9gm-2w5c
CVE-2026-33211
GO-2026-4761
Summary
A security issue in Tekton Pipelines git resolver allows an attacker with permission to create tasks or pipelines to read any file on the resolver pod's filesystem, which could lead to sensitive information exposure and potential privilege escalation. Affected users should update their Tekton Pipelines to the latest version to fix this issue.
What to do
- Update github.com tektoncd to version 1.0.1.
- Update github.com tektoncd to version 1.3.3.
- Update github.com tektoncd to version 1.6.1.
- Update github.com tektoncd to version 1.9.2.
- Update github.com tektoncd to version 1.10.2.
- Update tektoncd github.com/tektoncd/pipeline to version 1.10.2.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| github.com | tektoncd | > 1.0.0 , <= 1.0.1 | 1.0.1 |
| github.com | tektoncd | > 1.1.0 , <= 1.3.3 | 1.3.3 |
| github.com | tektoncd | > 1.4.0 , <= 1.6.1 | 1.6.1 |
| github.com | tektoncd | > 1.7.0 , <= 1.9.2 | 1.9.2 |
| github.com | tektoncd | > 1.10.0 , <= 1.10.2 | 1.10.2 |
| tektoncd | github.com/tektoncd/pipeline | > 1.10.0 , <= 1.10.2 | 1.10.2 |
Original title
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelin...
Original description
Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal via the `pathInRepo` parameter. A tenant with permission to create `ResolutionRequests` (e.g. by creating `TaskRuns` or `PipelineRuns` that use the git resolver) can read arbitrary files from the resolver pod's filesystem, including ServiceAccount tokens. The file contents are returned base64-encoded in `resolutionrequest.status.data`. Versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2 contain a patch.
ghsa CVSS3.1
9.6
Vulnerability type
CWE-22
Path Traversal
- https://github.com/tektoncd/pipeline/commit/10fa538f9a2b6d01c75138f1ed7ba3da0e34...
- https://github.com/tektoncd/pipeline/commit/318006c4e3a5
- https://github.com/tektoncd/pipeline/commit/3ca7bc6e6dd1d97f80b84f78370d91edaf02...
- https://github.com/tektoncd/pipeline/commit/961388fcf3374bc7656d28ab58ca84987e0a...
- https://github.com/tektoncd/pipeline/commit/b1fee65b88aa969069c14c120045e97c37d9...
- https://github.com/tektoncd/pipeline/commit/cdb4e1e97a4f3170f9bc2cbfff83a6c8107b...
- https://github.com/tektoncd/pipeline/commit/ec7755031a183b345cf9e64bea0e0505c1b9...
- https://github.com/tektoncd/pipeline/security/advisories/GHSA-j5q5-j9gm-2w5c
- https://github.com/advisories/GHSA-j5q5-j9gm-2w5c
Published: 24 Mar 2026 · Updated: 24 Mar 2026 · First seen: 18 Mar 2026