Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/rancher/fleet
  4. ›
  5. CVE-2026-41050

CVE-2026-41050: Fleet: Helm impersonation bypass of `RESTClientGetter` retains `cluster-admin` during template rendering

May 7, 2026

Fleet’s Helm deployer did not fully apply ServiceAccount impersonation in two code paths, allowing a tenant with git push access to a Fleet-monitored repository to read secrets from any namespace on every downstream cluster targeted by their GitRepo.

Helm lookup bypass: The Helm template engine ran Kubernetes API queries with the fleet-agent’s cluster-admin credentials instead of the impersonated ServiceAccount. A chart template could therefore access resources beyond the tenant’s RBAC scope.

valuesFrom bypass: Secret and ConfigMap references in fleet.yaml helm.valuesFrom were read using the fleet-agent’s cluster-admin client. A tenant could reference resources in namespaces the impersonated ServiceAccount has no access to. Both issues break Fleet’s multi-tenant impersonation boundary. The leaked credentials may belong to external services, making the full impact non-deterministic. Single-tenant deployments where all users are trusted are not affected.

Important:

  • For the exposure of additional credentials, the final impact severity for confidentiality, integrity and availability is dependent on the permissions the leaked credentials have on their services.
  • It is recommended to review for potentially leaked credentials in this scenario and to change them if deemed necessary.

Please consult the associated MITRE ATT&CK - Technique - Account Access Removal for further information about this category of attack.

References

  • github.com/advisories/GHSA-765j-qfrp-hm3j
  • github.com/rancher/fleet
  • github.com/rancher/fleet/security/advisories/GHSA-765j-qfrp-hm3j
  • nvd.nist.gov/vuln/detail/CVE-2026-41050

Code Behaviors & Features

Detect and mitigate CVE-2026-41050 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 0.11.0 before 0.11.13, all versions starting from 0.12.0 before 0.12.14, all versions starting from 0.13.0 before 0.13.10, all versions starting from 0.14.0 before 0.14.5, all versions starting from 0.15.0 before 0.15.1

Fixed versions

  • 0.15.1
  • 0.14.5
  • 0.13.10
  • 0.12.14
  • 0.11.13

Solution

Upgrade to versions 0.11.13, 0.12.14, 0.13.10, 0.14.5, 0.15.1 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

go/github.com/rancher/fleet/CVE-2026-41050.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 00:18:57 +0000.