CVE-2026-33211 PUBLISHED

Tekton Pipelines git resolver has path traversal that allows reading arbitrary files from the resolver pod

Assigner: GitHub_M
Reserved: 17.03.2026 Published: 23.03.2026 Updated: 24.03.2026

Tekton Pipelines project provides k8s-style resources for declaring CI/CD-style pipelines. Starting in version 1.0.0 and prior to versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2, the Tekton Pipelines git resolver is vulnerable to path traversal via the pathInRepo parameter. A tenant with permission to create ResolutionRequests (e.g. by creating TaskRuns or PipelineRuns that use the git resolver) can read arbitrary files from the resolver pod's filesystem, including ServiceAccount tokens. The file contents are returned base64-encoded in resolutionrequest.status.data. Versions 1.0.1, 1.3.3, 1.6.1, 1.9.2, and 1.10.2 contain a patch.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N
CVSS Score: 9.6

Product Status

Vendor tektoncd
Product pipeline
Versions
  • Version >= 1.0.0, < 1.0.1 is affected
  • Version >= 1.1.0, < 1.3.3 is affected
  • Version >= 1.4.0, < 1.6.1 is affected
  • Version >= 1.7.0, < 1.9.2 is affected
  • Version >= 1.10.0, < 1.10.2 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE