CVE-2026-32737 PUBLISHED

Romeo's invalid NetworkPolicy enables a malicious actor to pivot into another namespace

Assigner: GitHub_M
Reserved: 13.03.2026 Published: 18.03.2026 Updated: 18.03.2026

Romeo gives the capability to reach high code coverage of Go ≥1.20 apps by helping to measure code coverage for functional and integration tests within GitHub Actions. Prior to version 0.2.1, due to a mis-written NetworkPolicy, a malicious actor can pivot from the "hardened" namespace to any Pod out of it. This breaks the security-by-default property expected as part of the deployment program, leading to a potential lateral movement. Removing the inter-ns NetworkPolicy patches the vulnerability in version 0.2.1. If updates are not possible in production environments, manually delete inter-ns and update as soon as possible. Given one's context, delete the failing network policy that should be prefixed by inter-ns- in the target namespace.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
CVSS Score: 7.9

Product Status

Vendor ctfer-io
Product romeo
Versions
  • Version < 0.2.1 is affected

References

Problem Types

  • CWE-284: Improper Access Control CWE