CVE-2026-28406 PUBLISHED

kaniko has tar archive path traversal in build context extraction allows writing files outside destination directory

Assigner: GitHub_M
Reserved: 27.02.2026 Published: 27.02.2026 Updated: 27.02.2026

kaniko is a tool to build container images from a Dockerfile, inside a container or Kubernetes cluster. Starting in version 1.25.4 and prior to version 1.25.10, kaniko unpacks build context archives using filepath.Join(dest, cleanedName) without enforcing that the final path stays within dest. A tar entry like ../outside.txt escapes the extraction root and writes files outside the destination directory. In environments with registry authentication, this can be chained with docker credential helpers to achieve code execution within the executor process. Version 1.25.10 uses securejoin for path resolution in tar extraction.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L
CVSS Score: 8.2

Product Status

Vendor chainguard-forks
Product kaniko
Versions
  • Version >= 1.25.4, < 1.25.10 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE