CVE-2026-22728 PUBLISHED

sealed-secrets /v1/rotate can widen sealing scope to cluster-wide via attacker-controlled template annotations

Assigner: vmware
Reserved: 09.01.2026 Published: 26.02.2026 Updated: 26.02.2026

Bitnami Sealed Secrets is vulnerable to a scope-widening attack during the secret rotation (/v1/rotate) flow. The rotation handler derives the sealing scope for the newly encrypted output from untrusted spec.template.metadata.annotations present in the input SealedSecret. By submitting a victim SealedSecret to the rotate endpoint with the annotation sealedsecrets.bitnami.com/cluster-wide=true injected into the template metadata, a remote attacker can obtain a rotated version of the secret that is cluster-wide. This bypasses original "strict" or "namespace-wide" constraints, allowing the attacker to retarget and unseal the secret in any namespace or under any name to recover the plaintext credentials.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
CVSS Score: 4.9

Product Status

Vendor Bitnami
Product sealed-secrets
Versions Default: unaffected
  • affected from 0.35.0 to <0.36.0 (excl.)

References

Problem Types

  • CWE-284 CWE