Advisory Database
  • Advisories
  • Dependency Scanning
  1. golang
  2. ›
  3. github.com/akuity/kargo
  4. ›
  5. CVE-2026-27112

CVE-2026-27112: Kargo has an Authorization Bypass Vulnerability in Batch Resource Creation API Endpoints

February 19, 2026 (updated February 23, 2026)

The batch resource creation endpoints of both Kargo’s legacy gRPC API and newer REST API accept multi-document YAML payloads. When either endpoint creates a Project resource, creation of subsequent resources from that same payload belonging in that Project’s underlying Kubernetes namespace, by design, proceeds using the API server’s own permissions. The creator of a new Project automatically becomes its administrator, but those permissions are granted asynchronously by the management controller. The design choice to create the affected resources using the API server’s own permissions averts a race and is contextually appropriate.

Specially crafted payloads can manifest a bug present in the logic of both endpoints to inject arbitrary resources (of specific types only) into the underlying namespace of an existing Project using the API server’s own permissions when that behavior was not intended. Critically, an attacker may exploit this as a vector for elevating their own permissions, which can then be leveraged to achieve remote code execution or secret exfiltration. Exfiltrated artifact repository credentials can be leveraged, in turn, to execute further attacks.

In some configurations of the Kargo control plane’s underlying Kubernetes cluster, elevated permissions may additionally be leveraged to achieve remote code execution or secret exfiltration using kubectl. This can reduce the complexity of the attack, however, worst case scenarios remain entirely achievable even without this.

References

  • github.com/advisories/GHSA-7g9x-cp9g-92mr
  • github.com/akuity/kargo
  • github.com/akuity/kargo/commit/155c6852ffbffa2902f18e6c7add91a846e8d344
  • github.com/akuity/kargo/security/advisories/GHSA-7g9x-cp9g-92mr
  • nvd.nist.gov/vuln/detail/CVE-2026-27112

Code Behaviors & Features

Detect and mitigate CVE-2026-27112 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.7.0 before 1.7.8, all versions starting from 1.8.0-rc.1 before 1.8.11, all versions starting from 1.9.0-rc.1 before 1.9.3

Fixed versions

  • 1.9.3
  • 1.8.11
  • 1.7.8

Solution

Upgrade to versions 1.7.8, 1.8.11, 1.9.3 or above.

Impact 9.9 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-863: Incorrect Authorization

Source file

go/github.com/akuity/kargo/CVE-2026-27112.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 24 Mar 2026 12:17:21 +0000.