Gardener, Privilege Escalation via Metadata Injection, CVE-2025-XXXX (Critical)

Listen to this Post

This vulnerability in Gardener’s `gardenlet` component allows attackers with project admin privileges to inject malicious metadata into project secrets. By exploiting improper access controls in the GCP extension, an attacker can manipulate the seed cluster’s metadata service, leading to unauthorized access to the seed cluster hosting shoot clusters. The flaw arises when gardenlet fails to sanitize user-supplied metadata during secret creation, enabling privilege escalation to cluster-admin level.

DailyCVE Form

Platform: Gardener
Version: <1.116.4, 1.117.0-1.117.4, 1.118.0-1.118.1
Vulnerability: Metadata injection
Severity: Critical
Date: May 19, 2025

What Undercode Say:

Exploitation:

  1. Attacker crafts malicious metadata in a project secret:
    metadata:
    annotations:
    malicious-key: "malicious-value"
    
  2. Leverages GCP extension to propagate metadata to seed cluster.

3. Compromises seed cluster via injected payload.

Protection:

1. Patch to fixed versions (`1.116.4`, `1.117.5`, `1.118.2`).

2. Restrict project admin privileges.

3. Audit logs for anomalous secret modifications:

kubectl logs -n garden gardenlet | grep "secret-update"

Detection Command:

kubectl get shoots --all-namespaces -o json | jq '.items[] | select(.metadata.annotations != null)'

Mitigation Script:

!/bin/sh
Force-update gardenlet
kubectl -n garden set image deployment/gardenlet gardenlet=gardener/gardenlet:1.118.2

References:

Sources:

Reported By: github.com
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top