Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
8.0
Rancher UI retains old Azure AD permissions
GHSA-vf6j-6739-78m8
CVE-2023-22648
Summary
Rancher UI doesn't update permissions when you change groups in Azure AD. This means you may still have access to Rancher even if you're supposed to lose it. To fix, update to version 2.6.13 or later and log out and log back in if you're already using an affected version.
What to do
- Update github.com rancher to version 2.6.13.
- Update github.com rancher to version 2.7.4.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| github.com | rancher | > 2.6.7 , <= 2.6.13 | 2.6.13 |
| github.com | rancher | > 2.7.0 , <= 2.7.4 | 2.7.4 |
| suse | rancher | > 2.6.7 , <= 2.6.13 | – |
| suse | rancher | > 2.7.0 , <= 2.7.4 | – |
Original title
Rancher's Azure AD permission changes are not reflected on active sessions
Original description
A bug has been identified in which permission changes in Azure AD are not reflected to users while they are logged in the Rancher UI. This would cause the users to retain their previous permissions in Rancher, even if they change groups on Azure AD, for example, to a lower privileged group, or are removed from a group, thus retaining their access to Rancher instead of losing it.
### Impact
This issue only affects Rancher instances with Azure AD integration enabled, regardless of the [automatically refreshing settings](https://ranchermanager.docs.rancher.com/how-to-guides/new-user-guides/authentication-permissions-and-global-configuration/authentication-config/manage-users-and-groups#automatically-refreshing-user-information) which are enabled by default. The users that obtained a token (or kubeconfig) to access Rancher through the following sessions are affected by this issue:
1) Users using the Rancher UI.
2) Users using `kubectl` based on a `kubeconfig` downloaded through the Rancher UI.
3) Tokens created via the Rancher UI Create API Key feature.
Note that the permission caching is persisted even when the Rancher Manager pod is restarted. The only way for a user to get the new permissions is to logout and login again.
### Patches
Patched versions include releases `2.6.13`, `2.7.4` and later versions.
### For more information
If you have any questions or comments about this advisory:
- Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
- Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
- Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
### Impact
This issue only affects Rancher instances with Azure AD integration enabled, regardless of the [automatically refreshing settings](https://ranchermanager.docs.rancher.com/how-to-guides/new-user-guides/authentication-permissions-and-global-configuration/authentication-config/manage-users-and-groups#automatically-refreshing-user-information) which are enabled by default. The users that obtained a token (or kubeconfig) to access Rancher through the following sessions are affected by this issue:
1) Users using the Rancher UI.
2) Users using `kubectl` based on a `kubeconfig` downloaded through the Rancher UI.
3) Tokens created via the Rancher UI Create API Key feature.
Note that the permission caching is persisted even when the Rancher Manager pod is restarted. The only way for a user to get the new permissions is to logout and login again.
### Patches
Patched versions include releases `2.6.13`, `2.7.4` and later versions.
### For more information
If you have any questions or comments about this advisory:
- Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.
- Open an issue in the [Rancher](https://github.com/rancher/rancher/issues/new/choose) repository.
- Verify with our [support matrix](https://www.suse.com/suse-rancher/support-matrix/all-supported-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/).
ghsa CVSS3.1
8.0
Vulnerability type
CWE-269
Improper Privilege Management
CWE-271
CWE-384
Published: 3 Mar 2026 · Updated: 7 Mar 2026 · First seen: 6 Mar 2026